Critical severity10.0NVD Advisory· Published Apr 23, 2026· Updated Apr 29, 2026
CVE-2026-41211
CVE-2026-41211
Description
Vite+ is a unified toolchain and entry point for web development. Prior to version 0.1.17, downloadPackageManager() accepts an untrusted version string and uses it directly in filesystem paths. A caller can supply ../ segments or an absolute path to escape the VP_HOME/package_manager/<pm>/ cache root and make Vite+ delete, replace, and populate directories outside the intended cache location. Version 0.1.17 contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vite-plusnpm | < 0.1.17 | 0.1.17 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/voidzero-dev/vite-plus/security/advisories/GHSA-33r3-4whc-44c2nvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-33r3-4whc-44c2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41211ghsaADVISORY
News mentions
0No linked articles in our index yet.