Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine

NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine

Posted on August 4, 2025August 4, 2025 By CWS

A essential safety vulnerability has been found within the NestJS framework’s growth instruments that allows distant code execution (RCE) assaults towards JavaScript builders. 

The flaw, recognized as CVE-2025-54782, impacts the @nestjs/devtools-integration package deal and permits malicious web sites to execute arbitrary code on builders’ native machines via refined sandbox escape strategies.

Key Takeaways1. Vital RCE flaw in NestJS devtools permits code execution through malicious web sites.2. Attributable to an unsafe JavaScript sandbox and poor CORS validation.3. Speedy repair required.

The vulnerability disclosed carries a essential severity ranking of 9.4 on the CVSS v4 scale, highlighting the rapid hazard it poses to the event neighborhood. 

NestJS, described as “a progressive Node.js framework for constructing environment friendly and scalable server-side purposes,” has over 4,100 followers on GitHub and is broadly utilized in enterprise-grade purposes.

NestJS Sandbox RCE Vulnerability

The safety flaw stems from the @nestjs/devtools-integration package deal’s HTTP endpoint /inspector/graph/work together, which processes JSON enter containing a code subject and executes it inside a Node.js vm.runInNewContext sandbox. 

The susceptible implementation intently resembles the deserted safe-eval library and fails to offer ample safety controls.

The problematic code features a flawed sandbox implementation:

The vulnerability is additional compounded by insufficient Cross-Origin Useful resource Sharing (CORS) protections. 

Whereas the server units Entry-Management-Enable-Origin to https://devtools[.]nestjs.com, it fails to validate the request’s Origin or Content material-Sort headers correctly. 

Attackers can exploit this weak point by crafting POST requests with textual content/plain content material sort, successfully bypassing CORS preflight checks.

Danger FactorsDetailsAffected Merchandise@nestjs/devtools-integration package deal (npm)≤0.2.0ImpactRemote Code Execution (RCE)Exploit Conditions– Developer visits malicious website- NestJS devtools integration enabled- Growth server working locallyCVSS v4 Score9.4

Safety researcher JLLeitschuh, engaged on behalf of Socket, demonstrated the exploit utilizing a easy HTML kind that may set off the vulnerability when a developer visits a malicious web site. 

The proof-of-concept payload leverages JavaScript’s property enumeration to flee the sandbox and acquire entry to Node.js’s child_process module for arbitrary command execution.

The NestJS maintainers have addressed this essential difficulty in model 0.2.1 by implementing a safer sandboxing various utilizing @nyariv/sandboxjs, including correct origin validation, and introducing authentication mechanisms for devtools connections. 

Builders utilizing affected variations (≤0.2.0) are strongly suggested to improve instantly to mitigate the danger of distant code execution assaults towards their growth environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Arbitrary, Code, Developers, Execute, Framework, Machine, NestJS, Vulnerability

Post navigation

Previous Post: Several Vulnerabilities Patched in AI Code Editor Cursor 
Next Post: AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

Related Posts

YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Cyber Security News
PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware Cyber Security News
SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark