Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27210: Vulnerability in nodejs node

0
High
VulnerabilityCVE-2025-27210cvecve-2025-27210
Published: Fri Jul 18 2025 (07/18/2025, 22:54:27 UTC)
Source: CVE Database V5
Vendor/Project: nodejs
Product: node

Description

An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. This vulnerability affects Windows users of `path.join` API.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:44:45 UTC

Technical Analysis

CVE-2025-27210 is a vulnerability in the Node.js runtime environment specifically affecting the path.join API on Windows platforms. The issue arises from an incomplete remediation of a prior vulnerability (CVE-2025-23084) that involved improper handling of Windows reserved device names like CON, PRN, and AUX. These device names are special system identifiers in Windows that can cause unexpected behavior when used in file paths. The vulnerability allows an attacker to craft malicious input to the path.join function, potentially bypassing intended path restrictions and causing the application to access or disclose sensitive files. The CVSS v3.0 score of 7.5 reflects a high severity due to the vulnerability's network attack vector, low attack complexity, and no requirement for privileges or user interaction. The impact is primarily on confidentiality, as unauthorized file access could expose sensitive data. The vulnerability affects Node.js versions 20.0.0, 22.0.0, and 24.0.0, which are commonly used in modern web and server-side applications. No public exploits have been reported yet, but the vulnerability is critical enough to warrant immediate attention. The CWE-22 classification indicates a path traversal or directory traversal weakness, emphasizing the need for input validation and secure path handling. Since the vulnerability is specific to Windows device names, it only affects Node.js deployments on Windows systems. The lack of available patches at the time of publication means organizations must implement interim mitigations and monitor for vendor updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, especially for those running Node.js applications on Windows servers that handle sensitive or regulated data such as personal information, financial records, or intellectual property. Exploitation could lead to unauthorized disclosure of files, potentially violating GDPR and other data protection regulations. The vulnerability's presence in widely used Node.js versions means many enterprises, including software development firms, cloud service providers, and critical infrastructure operators, could be affected. The ease of exploitation without authentication or user interaction increases the threat level, making automated attacks feasible. Organizations relying on Windows-based Node.js environments for web services, APIs, or backend processing are particularly vulnerable. The impact on integrity and availability is minimal based on current information, but confidentiality breaches alone can cause substantial reputational and financial damage. Additionally, the incomplete fix suggests that previous mitigation efforts were insufficient, highlighting the need for thorough patch management and code review. The absence of known exploits in the wild provides a window for proactive defense but should not lead to complacency.

Mitigation Recommendations

European organizations should immediately audit their Node.js environments to identify usage of affected versions (20.0.0, 22.0.0, 24.0.0) on Windows platforms. Until official patches are released, developers should implement strict input validation and sanitization for any file path inputs, explicitly disallowing reserved Windows device names such as CON, PRN, AUX, NUL, COM1-COM9, and LPT1-LPT9. Avoid using path.join with untrusted input or implement custom wrappers that enforce safe path construction. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAF) with rules to detect and block suspicious path traversal attempts targeting device names. Monitor Node.js vendor channels and security advisories closely for patch releases and apply updates promptly. Conduct code reviews focusing on file system access patterns and consider isolating Node.js applications in containers or sandboxes to limit potential damage. Implement logging and alerting on unusual file access patterns to detect exploitation attempts early. Finally, educate development teams about the risks of improper path handling and the specifics of Windows device name vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.798Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 687ad236a83201eaacf76194

Added to database: 7/18/2025, 11:01:10 PM

Last enriched: 11/4/2025, 9:44:45 PM

Last updated: 11/20/2025, 4:54:52 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats