
CVE-2025-27415 – Nuxt allows DOS via cache poisoning with payload rendering response
https://notcve.org/view.php?id=CVE-2025-27415
19 Mar 2025 — Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site. It is possible to craft a request, such as https://mysite.com/?/_payload.json which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future vi... • https://github.com/nuxt/nuxt/security/advisories/GHSA-jvhm-gjrh-3h93 • CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data •

CVE-2025-24981 – Parsed HTML anchor links in Markdown provided to parseMarkdown can result in XSS in @nuxtjs/mdc
https://notcve.org/view.php?id=CVE-2025-24981
06 Feb 2025 — MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. In affected versions unsafe parsing logic of the URL from markdown can lead to arbitrary JavaScript code due to a bypass to the existing guards around the `javascript:` protocol scheme in the URL. The parsing logic implement in `props.ts` maintains a deny-list approach to filtering potential malicious payload. It does so by matching protocol schemes like `javascript:` and others. These security guards can be ... • https://github.com/nuxt-modules/mdc/blob/main/src/runtime/parser/utils/props.ts#L16 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2025-24361 – Opening a malicious website while running a Nuxt dev server could allow read-only access to code
https://notcve.org/view.php?id=CVE-2025-24361
25 Jan 2025 — Nuxt is an open-source web development framework for Vue.js. Source code may be stolen during dev when using version 3.0.0 through 3.15.12 of the webpack builder or version 3.12.2 through 3.152 of the rspack builder and a victim opens a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. By using `Function::toString` against the values in `window.webpackChunknuxt_app`, the... • https://github.com/nuxt/nuxt/commit/7eeb910bf4accb1e0193b9178c746f06ad3dd88f • CWE-749: Exposed Dangerous Method or Function •

CVE-2025-24360 – Opening a malicious website while running a Nuxt dev server could allow read-only access to code
https://notcve.org/view.php?id=CVE-2025-24360
25 Jan 2025 — Nuxt is an open-source web development framework for Vue.js. Starting in version 3.8.1 and prior to version 3.15.3, Nuxt allows any websites to send any requests to the development server and read the response due to default CORS settings. Users with the default server.cors option using Vite builder may get the source code stolen by malicious websites. Version 3.15.3 fixes the vulnerability. • https://github.com/nuxt/nuxt/blob/7d345c71462d90187fd09c96c7692f306c90def5/packages/vite/src/client.ts#L257-L263 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-42352 – Server-Side Request Forgery (SSRF) in nuxt-icon
https://notcve.org/view.php?id=CVE-2024-42352
05 Aug 2024 — Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. `nuxt/icon` provides an API to allow client side icon lookup. This endpoint is at `/api/_nuxt_icon/[name]`. The proxied request path is improperly parsed, allowing an attacker to change the scheme and host of the request. This leads to SSRF, and could potentially lead to sensitive data exposure. • https://github.com/nuxt/icon/security/advisories/GHSA-cxgv-px37-4mp2 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2024-34344 – Remote code execution via the browser when running the test locally in nuxt
https://notcve.org/view.php?id=CVE-2024-34344
05 Aug 2024 — Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. Due to the insufficient validation of the `path` parameter in the NuxtTestComponentWrapper, an attacker can execute arbitrary JavaScript on the server side, which allows them to execute arbitrary commands. Users who open a malicious web page in the browser while running the test locally are affected by this vulnerability, which results in the remote code execution from the malicious web page. Since web p... • https://github.com/nuxt/nuxt/security/advisories/GHSA-v784-fjjh-f8r4 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-34343 – Cross-site Scripting (XSS) in navigateTo if used after SSR in nuxt
https://notcve.org/view.php?id=CVE-2024-34343
05 Aug 2024 — Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. The `navigateTo` function attempts to blockthe `javascript:` protocol, but does not correctly use API's provided by `unjs/ufo`. This library also contains parsing discrepancies. The function first tests to see if the specified URL has a protocol. This uses the unjs/ufo package for URL parsing. • https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-23657 – Path Traversal: '../filedir' in Nuxt Devtools
https://notcve.org/view.php?id=CVE-2024-23657
05 Aug 2024 — Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. Nuxt Devtools is missing authentication on the `getTextAssetContent` RPC function which is vulnerable to path traversal. Combined with a lack of Origin checks on the WebSocket handler, an attacker is able to interact with a locally running devtools instance and exfiltrate data abusing this vulnerability. In certain configurations an attacker could leak the devtools authentication token and then abuse oth... • https://github.com/nuxt/devtools/blob/c4f2b68281203fc3f61ffc97d9c6623fbfde46bb/packages/devtools/src/dev-auth.ts#L14 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-24: Path Traversal: '../filedir' •

CVE-2023-3224 – Code Injection in nuxt/nuxt
https://notcve.org/view.php?id=CVE-2023-3224
13 Jun 2023 — Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3. Inyección de código en el repositorio de GitHub nuxt/nuxt anterior a 3.5.3. • https://github.com/nuxt/nuxt/commit/65a8f4eb3ef1b249a95fd59e323835a96428baff • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-0878 – Cross-site Scripting (XSS) - Generic in nuxt/framework
https://notcve.org/view.php?id=CVE-2023-0878
17 Feb 2023 — Cross-site Scripting (XSS) - Generic in GitHub repository nuxt/framework prior to 3.2.1. • https://github.com/nuxt/framework/commit/7aa35ff958eec0c7d071d3fcd481db57281dbcd9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •