Vulnerability Description
Vite+ is a unified toolchain and entry point for web development. Prior to version 0.1.17, `downloadPackageManager()` accepts an untrusted `version` string and uses it directly in filesystem paths. A caller can supply `../` segments or an absolute path to escape the `VP_HOME/package_manager/<pm>/` cache root and make Vite+ delete, replace, and populate directories outside the intended cache location. Version 0.1.17 contains a patch.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Voidzero | Vite\+ | < 0.1.17 |
Related Weaknesses (CWE)
References
- https://github.com/voidzero-dev/vite-plus/security/advisories/GHSA-33r3-4whc-44cExploitMitigationVendor Advisory
- https://github.com/voidzero-dev/vite-plus/security/advisories/GHSA-33r3-4whc-44cExploitMitigationVendor Advisory
FAQ
What is CVE-2026-41211?
CVE-2026-41211 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Vite+ is a unified toolchain and entry point for web development. Prior to version 0.1.17, `downloadPackageManager()` accepts an untrusted `version` string and uses it directly in filesystem paths. A ...
How severe is CVE-2026-41211?
CVE-2026-41211 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-41211?
Check the references section above for vendor advisories and patch information. Affected products include: Voidzero Vite\+.