CVE-2023-30585: Vulnerability in NodeJS Node
A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM context, attempts to read the %USERPROFILE% environment variable from the current user's registry. The issue arises when the path referenced by the %USERPROFILE% environment variable does not exist. In such cases, the "msiexec.exe" process attempts to create the specified path in an unsafe manner, potentially leading to the creation of arbitrary folders in arbitrary locations. The severity of this vulnerability is heightened by the fact that the %USERPROFILE% environment variable in the Windows registry can be modified by standard (or "non-privileged") users. Consequently, unprivileged actors, including malicious entities or trojans, can manipulate the environment variable key to deceive the privileged "msiexec.exe" process. This manipulation can result in the creation of folders in unintended and potentially malicious locations. It is important to note that this vulnerability is specific to Windows users who install Node.js using the .msi installer. Users who opt for other installation methods are not affected by this particular issue.
AI Analysis
Technical Summary
CVE-2023-30585 is a security vulnerability identified in the Node.js MSI installer for Windows platforms, impacting all Node.js versions from 4.0 through 20.0. The vulnerability manifests during the repair operation of the Node.js installation, where the Windows Installer service (msiexec.exe) runs under the NT AUTHORITY\SYSTEM context and attempts to read the %USERPROFILE% environment variable from the current user's registry hive. The problem arises when the path pointed to by %USERPROFILE% does not exist on the filesystem. In this scenario, msiexec.exe attempts to create the missing directory path but does so in an unsafe manner that does not properly validate or restrict the location of the created folders. Because the %USERPROFILE% environment variable registry key can be modified by standard, non-privileged users, an attacker with local access can manipulate this key to point to arbitrary locations. When the repair operation is triggered, msiexec.exe will create folders in these attacker-controlled paths with SYSTEM privileges. This behavior can be exploited to create directories or files in protected areas, potentially enabling privilege escalation, persistence mechanisms, or other malicious activities that require elevated privileges. The vulnerability is specific to the MSI installer method on Windows; users installing Node.js through other means (e.g., ZIP archives, package managers) are not affected. As of the publication date, no known exploits have been reported in the wild, and no CVSS score has been assigned. The vulnerability requires local user access and some user interaction (triggering a repair), limiting remote exploitation but still posing a significant risk in environments where local user accounts may be compromised or untrusted.
Potential Impact
For European organizations, this vulnerability primarily threatens Windows systems where Node.js is installed using the MSI installer. The ability for a non-privileged user to manipulate the %USERPROFILE% environment variable and cause the SYSTEM-level msiexec.exe process to create arbitrary folders can lead to privilege escalation or persistence on critical servers or developer workstations. This risk is heightened in environments with shared or multi-user Windows systems, such as development teams, CI/CD servers, or build environments common in European tech companies. Exploitation could allow attackers to implant malicious payloads or backdoors with SYSTEM privileges, undermining confidentiality, integrity, and availability of affected systems. While remote exploitation is not feasible, insider threats or malware with local access could leverage this vulnerability. Given the widespread use of Node.js in European enterprises and public sector organizations, especially in software development and cloud infrastructure, the vulnerability could impact a broad range of targets. The lack of a patch at the time of disclosure increases exposure, and organizations with strict security policies relying on MSI installations should prioritize mitigation to avoid lateral movement or privilege escalation attacks.
Mitigation Recommendations
European organizations should immediately audit their Windows systems to identify Node.js installations performed via the MSI installer. Where possible, switch to alternative installation methods such as ZIP archives or package managers that are not affected by this vulnerability. Until a patch is released, restrict local user permissions to prevent modification of the %USERPROFILE% environment variable in the registry. Implement monitoring to detect unusual folder creation activities initiated by msiexec.exe or other SYSTEM processes. Employ application whitelisting and endpoint detection and response (EDR) tools to identify suspicious repair operations or privilege escalation attempts. Educate users and administrators about the risk of running repair operations without verifying environment variables. In environments with shared workstations or developer machines, enforce strict user account controls and consider isolating build environments to reduce the risk of local exploitation. Finally, stay updated with Node.js vendor advisories and apply official patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Poland
CVE-2023-30585: Vulnerability in NodeJS Node
Description
A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM context, attempts to read the %USERPROFILE% environment variable from the current user's registry. The issue arises when the path referenced by the %USERPROFILE% environment variable does not exist. In such cases, the "msiexec.exe" process attempts to create the specified path in an unsafe manner, potentially leading to the creation of arbitrary folders in arbitrary locations. The severity of this vulnerability is heightened by the fact that the %USERPROFILE% environment variable in the Windows registry can be modified by standard (or "non-privileged") users. Consequently, unprivileged actors, including malicious entities or trojans, can manipulate the environment variable key to deceive the privileged "msiexec.exe" process. This manipulation can result in the creation of folders in unintended and potentially malicious locations. It is important to note that this vulnerability is specific to Windows users who install Node.js using the .msi installer. Users who opt for other installation methods are not affected by this particular issue.
AI-Powered Analysis
Technical Analysis
CVE-2023-30585 is a security vulnerability identified in the Node.js MSI installer for Windows platforms, impacting all Node.js versions from 4.0 through 20.0. The vulnerability manifests during the repair operation of the Node.js installation, where the Windows Installer service (msiexec.exe) runs under the NT AUTHORITY\SYSTEM context and attempts to read the %USERPROFILE% environment variable from the current user's registry hive. The problem arises when the path pointed to by %USERPROFILE% does not exist on the filesystem. In this scenario, msiexec.exe attempts to create the missing directory path but does so in an unsafe manner that does not properly validate or restrict the location of the created folders. Because the %USERPROFILE% environment variable registry key can be modified by standard, non-privileged users, an attacker with local access can manipulate this key to point to arbitrary locations. When the repair operation is triggered, msiexec.exe will create folders in these attacker-controlled paths with SYSTEM privileges. This behavior can be exploited to create directories or files in protected areas, potentially enabling privilege escalation, persistence mechanisms, or other malicious activities that require elevated privileges. The vulnerability is specific to the MSI installer method on Windows; users installing Node.js through other means (e.g., ZIP archives, package managers) are not affected. As of the publication date, no known exploits have been reported in the wild, and no CVSS score has been assigned. The vulnerability requires local user access and some user interaction (triggering a repair), limiting remote exploitation but still posing a significant risk in environments where local user accounts may be compromised or untrusted.
Potential Impact
For European organizations, this vulnerability primarily threatens Windows systems where Node.js is installed using the MSI installer. The ability for a non-privileged user to manipulate the %USERPROFILE% environment variable and cause the SYSTEM-level msiexec.exe process to create arbitrary folders can lead to privilege escalation or persistence on critical servers or developer workstations. This risk is heightened in environments with shared or multi-user Windows systems, such as development teams, CI/CD servers, or build environments common in European tech companies. Exploitation could allow attackers to implant malicious payloads or backdoors with SYSTEM privileges, undermining confidentiality, integrity, and availability of affected systems. While remote exploitation is not feasible, insider threats or malware with local access could leverage this vulnerability. Given the widespread use of Node.js in European enterprises and public sector organizations, especially in software development and cloud infrastructure, the vulnerability could impact a broad range of targets. The lack of a patch at the time of disclosure increases exposure, and organizations with strict security policies relying on MSI installations should prioritize mitigation to avoid lateral movement or privilege escalation attacks.
Mitigation Recommendations
European organizations should immediately audit their Windows systems to identify Node.js installations performed via the MSI installer. Where possible, switch to alternative installation methods such as ZIP archives or package managers that are not affected by this vulnerability. Until a patch is released, restrict local user permissions to prevent modification of the %USERPROFILE% environment variable in the registry. Implement monitoring to detect unusual folder creation activities initiated by msiexec.exe or other SYSTEM processes. Employ application whitelisting and endpoint detection and response (EDR) tools to identify suspicious repair operations or privilege escalation attempts. Educate users and administrators about the risk of running repair operations without verifying environment variables. In environments with shared workstations or developer machines, enforce strict user account controls and consider isolating build environments to reduce the risk of local exploitation. Finally, stay updated with Node.js vendor advisories and apply official patches promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2023-04-13T01:00:12.086Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed51b
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 11/4/2025, 12:15:08 AM
Last updated: 12/3/2025, 12:29:50 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13947: Vulnerability in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
MediumCVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighCVE-2025-29864: CWE-693 Protection Mechanism Failure in ESTsoft ALZip
MediumCVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.