info: name: NestJS DevTools Integration - Remote Code Execution author: SeongHyeonJeon[nukunga] severity: critical description: | The @nestjs/devtools-integration package <=0.2.0 is vulnerable to a Remote Code Execution (RCE) vulnerability. The package exposes a local development HTTP server with an API endpoint (/inspector/graph/interact) that uses an unsafe JavaScript sandbox. Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. reference: - https://socket.dev/blog/nestjs-rce-vuln - https://github.com/nestjs/nest/security/advisories/GHSA-85cg-cmq5-qjm7 - https://nvd.nist.gov/vuln/detail/CVE-2025-54782 classification: cvss-metrics: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H cvss-score:9.4 cve-id: CVE-2025-54782 cwe-id: CWE-77, CWE-352, CWE-78 tags: cve,cve2025,nestjs,rce,sandbox,devtool,unauth