Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nestjs
Nestjs devtools-integration |
|
Vendors & Products |
Nestjs
Nestjs devtools-integration |
Mon, 04 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 02 Aug 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1. | |
Title | @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers | |
Weaknesses | CWE-352 CWE-77 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-01T23:36:58.421Z
Updated: 2025-08-04T15:23:30.116Z
Reserved: 2025-07-29T16:50:28.391Z
Link: CVE-2025-54782

Updated: 2025-08-04T15:23:18.309Z

Status : Awaiting Analysis
Published: 2025-08-02T00:15:25.953
Modified: 2025-08-04T16:15:33.970
Link: CVE-2025-54782

No data.