Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54798: CWE-59: Improper Link Resolution Before File Access ('Link Following') in raszi node-tmp

0
Low
VulnerabilityCVE-2025-54798cvecve-2025-54798cwe-59
Published: Thu Aug 07 2025 (08/07/2025, 00:04:35 UTC)
Source: CVE Database V5
Vendor/Project: raszi
Product: node-tmp

Description

tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:42:20 UTC

Technical Analysis

CVE-2025-54798 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access) affecting the node-tmp package, a utility for creating temporary files and directories in Node.js applications. Versions prior to 0.2.4 do not properly handle symbolic links in the directory parameter, allowing an attacker with local access to specify a symbolic link that points to an arbitrary location. This improper link resolution can lead to arbitrary file or directory writes in locations not intended by the application, potentially overwriting critical files or planting malicious files. The vulnerability requires the attacker to have at least low-level privileges on the system (local access) and does not require user interaction, but the attack complexity is considered high due to the need to create specific symbolic links and conditions. The CVSS score of 2.5 reflects a low severity, primarily impacting integrity without affecting confidentiality or availability. The flaw is fixed in version 0.2.4 of node-tmp. No known exploits have been reported in the wild, indicating limited active exploitation. However, the vulnerability poses a risk in environments where node-tmp is used in multi-user or shared systems, or where local attackers can gain footholds. The issue highlights the importance of secure handling of symbolic links in temporary file creation utilities to prevent unauthorized file system modifications.

Potential Impact

For European organizations, the primary impact of CVE-2025-54798 lies in the potential for local attackers to modify or overwrite files by exploiting the symbolic link vulnerability in node-tmp versions below 0.2.4. This can lead to integrity violations, such as tampering with application files, configuration files, or other critical data, potentially facilitating further privilege escalation or persistence mechanisms. Although the vulnerability does not directly compromise confidentiality or availability, the ability to write arbitrary files can undermine trust in the affected systems and lead to indirect impacts such as data corruption or unauthorized code execution if combined with other vulnerabilities. Organizations relying on Node.js applications that use node-tmp in multi-tenant or shared environments are at higher risk, especially if local user access controls are weak. The low CVSS score and absence of known exploits suggest a limited immediate threat, but the vulnerability should be addressed proactively to prevent exploitation in sensitive environments.

Mitigation Recommendations

1. Upgrade all instances of the node-tmp package to version 0.2.4 or later, where the vulnerability is fixed. 2. Conduct an inventory of Node.js applications and development environments to identify usage of node-tmp and ensure timely patching. 3. Restrict local user permissions to prevent untrusted users from creating symbolic links or accessing directories where temporary files are created. 4. Implement filesystem monitoring to detect unusual symbolic link creation or unauthorized file writes in temporary directories. 5. Use containerization or sandboxing to isolate Node.js applications, limiting the impact of potential local exploits. 6. Educate developers and system administrators about the risks of improper symbolic link handling and enforce secure coding practices around temporary file creation. 7. Regularly audit and review local access controls and user privileges on systems running Node.js applications to minimize the risk of local exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-29T16:50:28.395Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6893f7c1ad5a09ad00f58d67

Added to database: 8/7/2025, 12:48:01 AM

Last enriched: 11/4/2025, 1:42:20 AM

Last updated: 11/8/2025, 1:13:18 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats