webpack-dev-server versions up to and including 5.2.3 are vulnerable to cross-origin source code exposure when serving over a non-potentially trustworthy origin such as plain HTTP. The previous fix relied on the Sec-Fetch-Mode and Sec-Fetch-Site request headers, which browsers omit for non-trustworthy origins, allowing a malicious site to load the bundled source as a script and read it across origins. Impact: an attacker controlling a website visited by a developer running webpack-dev-server can recover the application source code when the dev server runs over HTTP at a guessable host and port. Chromium based browsers from Chrome 142 onward are not affected due to local network access restrictions. Upgrade to webpack-dev-server 5.2.4 or later, which sets Cross-Origin-Resource-Policy: same-origin on responses.

Project Subscriptions

Vendors Products
Webpack.js Subscribe
Webpack-dev-server Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-79cf-xcqc-c78w webpack-dev-server vulnerable to cross-origin source code exposure on non-HTTPS origins
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 18 May 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webpack.js:webpack-dev-server:*:*:*:*:*:*:*:*

Sun, 17 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Webpack.js
Webpack.js webpack-dev-server
Vendors & Products Webpack.js
Webpack.js webpack-dev-server

Wed, 13 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-346
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description webpack-dev-server versions up to and including 5.2.3 are vulnerable to cross-origin source code exposure when serving over a non-potentially trustworthy origin such as plain HTTP. The previous fix relied on the Sec-Fetch-Mode and Sec-Fetch-Site request headers, which browsers omit for non-trustworthy origins, allowing a malicious site to load the bundled source as a script and read it across origins. Impact: an attacker controlling a website visited by a developer running webpack-dev-server can recover the application source code when the dev server runs over HTTP at a guessable host and port. Chromium based browsers from Chrome 142 onward are not affected due to local network access restrictions. Upgrade to webpack-dev-server 5.2.4 or later, which sets Cross-Origin-Resource-Policy: same-origin on responses.
Title webpack-dev-server vulnerable to cross-origin source code exposure on non-HTTPS origins
Weaknesses CWE-749
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published:

Updated: 2026-05-12T13:00:06.847Z

Reserved: 2026-04-15T20:35:29.271Z

Link: CVE-2026-6402

cve-icon Vulnrichment

Updated: 2026-05-12T12:58:56.596Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-12T09:16:55.640

Modified: 2026-05-18T15:23:03.800

Link: CVE-2026-6402

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-12T07:45:21Z

Links: CVE-2026-6402 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T19:42:26Z

Weaknesses