Loading HuntDB...

GHSA-cfph-4qqh-w828

GitHub Security Advisory

Arbitrary remote file read in Wrangler dev server

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

### Patches
This issue was fixed in `[email protected]`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps.

### Workarounds
Configure Wrangler to listen on local interfaces instead with `wrangler dev --ip 127.0.0.1`. This is the [default as of `[email protected]`](https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf), and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.

### References
- https://github.com/cloudflare/workers-sdk/pull/4532
- https://github.com/cloudflare/workers-sdk/pull/4535

Affected Packages

npm wrangler
Affected versions: 3.9.0 (fixed in 3.19.0)

Related CVEs

Key Information

GHSA ID
GHSA-cfph-4qqh-w828
Published
January 3, 2024 9:24 PM
Last Modified
January 3, 2024 9:24 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
wrangler
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.