Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine

Posted on August 4, 2025August 4, 2025 By CWS

A essential safety vulnerability has been found within the NestJS framework’s growth instruments that allows distant code execution (RCE) assaults towards JavaScript builders. 

The flaw, recognized as CVE-2025-54782, impacts the @nestjs/devtools-integration package deal and permits malicious web sites to execute arbitrary code on builders’ native machines via refined sandbox escape strategies.

Key Takeaways1. Vital RCE flaw in NestJS devtools permits code execution through malicious web sites.2. Attributable to an unsafe JavaScript sandbox and poor CORS validation.3. Speedy repair required.

The vulnerability disclosed carries a essential severity ranking of 9.4 on the CVSS v4 scale, highlighting the rapid hazard it poses to the event neighborhood. 

NestJS, described as “a progressive Node.js framework for constructing environment friendly and scalable server-side purposes,” has over 4,100 followers on GitHub and is broadly utilized in enterprise-grade purposes.

NestJS Sandbox RCE Vulnerability

The safety flaw stems from the @nestjs/devtools-integration package deal’s HTTP endpoint /inspector/graph/work together, which processes JSON enter containing a code subject and executes it inside a Node.js vm.runInNewContext sandbox. 

The susceptible implementation intently resembles the deserted safe-eval library and fails to offer ample safety controls.

The problematic code features a flawed sandbox implementation:

The vulnerability is additional compounded by insufficient Cross-Origin Useful resource Sharing (CORS) protections. 

Whereas the server units Entry-Management-Enable-Origin to https://devtools[.]nestjs.com, it fails to validate the request’s Origin or Content material-Sort headers correctly. 

Attackers can exploit this weak point by crafting POST requests with textual content/plain content material sort, successfully bypassing CORS preflight checks.

Danger FactorsDetailsAffected Merchandise@nestjs/devtools-integration package deal (npm)≤0.2.0ImpactRemote Code Execution (RCE)Exploit Conditions– Developer visits malicious website- NestJS devtools integration enabled- Growth server working locallyCVSS v4 Score9.4

Safety researcher JLLeitschuh, engaged on behalf of Socket, demonstrated the exploit utilizing a easy HTML kind that may set off the vulnerability when a developer visits a malicious web site. 

The proof-of-concept payload leverages JavaScript’s property enumeration to flee the sandbox and acquire entry to Node.js’s child_process module for arbitrary command execution.

The NestJS maintainers have addressed this essential difficulty in model 0.2.1 by implementing a safer sandboxing various utilizing @nyariv/sandboxjs, including correct origin validation, and introducing authentication mechanisms for devtools connections. 

Builders utilizing affected variations (≤0.2.0) are strongly suggested to improve instantly to mitigate the danger of distant code execution assaults towards their growth environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Arbitrary, Code, Developers, Execute, Framework, Machine, NestJS, Vulnerability

Post navigation

Previous Post: Several Vulnerabilities Patched in AI Code Editor Cursor 
Next Post: AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

Related Posts

AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cyber Security News
10 Best VPN Alternatives in 2025 Cyber Security News
LexisNexis Risk Solutions Data Breach Exposes 364,000 individuals personal Data Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
  • US Announces $100 Million for State, Local and Tribal Cybersecurity
  • AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points
  • New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
  • US Announces $100 Million for State, Local and Tribal Cybersecurity
  • AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points
  • New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News