Skip to main content

CVE-2025-23084: Vulnerability in NodeJS Node

Medium
VulnerabilityCVE-2025-23084cvecve-2025-23084
Published: Tue Jan 28 2025 (01/28/2025, 04:35:15 UTC)
Source: CVE
Vendor/Project: NodeJS
Product: Node

Description

A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory. On Windows, a path that does not start with the file separator is treated as relative to the current directory. This vulnerability affects Windows users of `path.join` API.

AI-Powered Analysis

AILast updated: 06/25/2025, 13:02:39 UTC

Technical Analysis

CVE-2025-23084 is a medium-severity vulnerability affecting the Node.js runtime environment on Windows platforms. The flaw lies in the handling of drive names within the Windows file system when using the Node.js `path.join` API. Normally, on Windows, paths that do not start with a file separator are treated as relative to the current directory. However, due to this vulnerability, certain Node.js functions incorrectly handle drive names and treat them as relative paths, which can cause the path resolution to point to the root directory instead of the intended relative location. This behavior can lead to directory traversal issues (classified under CWE-22), where an attacker might manipulate path inputs to access or reference files and directories outside of the intended scope. The vulnerability requires local access with low privileges and some user interaction to exploit, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The impact primarily affects confidentiality, allowing unauthorized reading of sensitive files, while integrity and availability impacts are limited. The vulnerability spans a wide range of Node.js versions from 4.0 through 23.0, indicating a long-standing issue in the Node.js codebase on Windows. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 28, 2025, and is tracked under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).

Potential Impact

For European organizations, this vulnerability poses a risk primarily to Windows-based Node.js applications that rely on the `path.join` API for file path resolution. Exploitation could allow attackers with limited local access and user interaction to read sensitive files outside the intended directories, potentially exposing confidential data such as configuration files, credentials, or proprietary information. This could lead to data breaches, intellectual property theft, or leakage of personal data protected under GDPR. The impact on system integrity and availability is low, but confidentiality breaches can have significant regulatory and reputational consequences. Organizations running Node.js on Windows servers, developer workstations, or CI/CD pipelines are particularly at risk. Given the widespread use of Node.js in web applications, microservices, and automation tools across Europe, especially in sectors like finance, healthcare, and government, the vulnerability could be leveraged in targeted attacks or insider threat scenarios. The lack of known exploits reduces immediate risk but does not eliminate the potential for future exploitation once proof-of-concept code becomes available.

Mitigation Recommendations

Immediately audit all Windows-based systems running Node.js versions 4.0 through 23.0 to identify vulnerable instances. Implement strict input validation and sanitization on all file path inputs used with `path.join` to prevent malicious path manipulation. Where feasible, restrict Node.js application execution environments to sandboxed or containerized setups limiting file system access. Monitor and log file system access patterns for unusual or unauthorized directory traversal attempts, especially involving root directory references. Apply the official Node.js security updates or patches as soon as they become available; in the meantime, consider upgrading to a patched or unaffected version if possible. Educate developers and DevOps teams about this vulnerability to avoid unsafe coding practices related to path handling on Windows. Use application-level access controls to limit the exposure of sensitive files and directories, reducing the impact of potential path traversal. Consider deploying host-based intrusion detection systems (HIDS) that can detect anomalous file access behaviors on Windows hosts running Node.js.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-01-10T19:05:52.771Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed628

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 1:02:39 PM

Last updated: 8/21/2025, 3:02:14 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats