{"uuid": "bf5c6c20-fbb8-48b9-a652-d89ccaa3bf5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24360", "type": "seen", "source": "https://t.me/cvedetector/16358", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24360 - Nuxt Cross-Origin Request Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24360 \nPublished : Jan. 25, 2025, 1:15 a.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Nuxt is an open-source web development framework for Vue.js. Starting in version 3.8.1 and prior to version 3.15.3, Nuxt allows any websites to send any requests to the development server and read the response due to default CORS settings. Users with the default server.cors option using Vite builder may get the source code stolen by malicious websites. Version 3.15.3 fixes the vulnerability. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-25T03:47:29.000000Z"}