CVE-2025-54798: CWE-59: Improper Link Resolution Before File Access ('Link Following') in raszi node-tmp
tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.
AI Analysis
Technical Summary
CVE-2025-54798 is a vulnerability identified in the 'node-tmp' package, a Node.js module used for creating temporary files and directories. The affected versions are all versions below 0.2.4. The vulnerability is classified under CWE-59, which relates to improper link resolution before file access, commonly known as 'link following'. Specifically, the issue arises when the 'dir' parameter, which specifies the directory for temporary file or directory creation, is a symbolic link. In vulnerable versions, the module does not properly resolve symbolic links before writing, allowing an attacker to influence the actual file system location where temporary files or directories are created. This can lead to arbitrary write operations to unintended locations if an attacker can control or create symbolic links. The vulnerability requires local access (Attack Vector: Local) and low privileges (Privileges Required: Low) but does not require user interaction. The complexity to exploit is high, and the scope is unchanged, meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 2.5, indicating a low severity primarily due to the limited impact and exploitation conditions. The vulnerability does not impact confidentiality or availability but can affect integrity by allowing unauthorized modification of files via symbolic link manipulation. No known exploits are reported in the wild, and the issue was fixed in version 0.2.4 of the node-tmp package.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but should not be dismissed. Node.js is widely used in web applications, backend services, and development tools across Europe. Organizations using versions of node-tmp below 0.2.4 in their software stacks may be exposed to arbitrary file write risks if an attacker has local access or can influence the environment where the application runs. This could lead to unauthorized modification of temporary files or directories, potentially enabling privilege escalation or persistence mechanisms if combined with other vulnerabilities. However, since exploitation requires local access and low privileges, remote attackers without initial access are unlikely to exploit this vulnerability directly. The risk is higher in multi-tenant environments, shared hosting, or containerized deployments where symbolic link manipulation might be feasible by less privileged users. European organizations with strict security policies and controlled environments will face minimal risk, but those with less restrictive access controls or legacy systems might be more vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should upgrade the node-tmp package to version 0.2.4 or later, where the issue is fixed. Additionally, organizations should implement strict file system permissions and access controls to prevent unauthorized users from creating or manipulating symbolic links in directories used for temporary file storage. Employing containerization best practices, such as running containers with minimal privileges and read-only file systems where possible, can reduce the attack surface. Monitoring and auditing file system changes, especially in temporary directories, can help detect suspicious symbolic link activities. For development and deployment pipelines, ensure dependency management tools are configured to automatically update vulnerable packages and verify the integrity of third-party modules. Finally, educating developers about secure handling of symbolic links and temporary files in Node.js applications will help prevent similar issues in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-54798: CWE-59: Improper Link Resolution Before File Access ('Link Following') in raszi node-tmp
Description
tmp is a temporary file and directory creator for node.js. In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary file / directory write via symbolic link dir parameter. This is fixed in version 0.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-54798 is a vulnerability identified in the 'node-tmp' package, a Node.js module used for creating temporary files and directories. The affected versions are all versions below 0.2.4. The vulnerability is classified under CWE-59, which relates to improper link resolution before file access, commonly known as 'link following'. Specifically, the issue arises when the 'dir' parameter, which specifies the directory for temporary file or directory creation, is a symbolic link. In vulnerable versions, the module does not properly resolve symbolic links before writing, allowing an attacker to influence the actual file system location where temporary files or directories are created. This can lead to arbitrary write operations to unintended locations if an attacker can control or create symbolic links. The vulnerability requires local access (Attack Vector: Local) and low privileges (Privileges Required: Low) but does not require user interaction. The complexity to exploit is high, and the scope is unchanged, meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 2.5, indicating a low severity primarily due to the limited impact and exploitation conditions. The vulnerability does not impact confidentiality or availability but can affect integrity by allowing unauthorized modification of files via symbolic link manipulation. No known exploits are reported in the wild, and the issue was fixed in version 0.2.4 of the node-tmp package.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but should not be dismissed. Node.js is widely used in web applications, backend services, and development tools across Europe. Organizations using versions of node-tmp below 0.2.4 in their software stacks may be exposed to arbitrary file write risks if an attacker has local access or can influence the environment where the application runs. This could lead to unauthorized modification of temporary files or directories, potentially enabling privilege escalation or persistence mechanisms if combined with other vulnerabilities. However, since exploitation requires local access and low privileges, remote attackers without initial access are unlikely to exploit this vulnerability directly. The risk is higher in multi-tenant environments, shared hosting, or containerized deployments where symbolic link manipulation might be feasible by less privileged users. European organizations with strict security policies and controlled environments will face minimal risk, but those with less restrictive access controls or legacy systems might be more vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should upgrade the node-tmp package to version 0.2.4 or later, where the issue is fixed. Additionally, organizations should implement strict file system permissions and access controls to prevent unauthorized users from creating or manipulating symbolic links in directories used for temporary file storage. Employing containerization best practices, such as running containers with minimal privileges and read-only file systems where possible, can reduce the attack surface. Monitoring and auditing file system changes, especially in temporary directories, can help detect suspicious symbolic link activities. For development and deployment pipelines, ensure dependency management tools are configured to automatically update vulnerable packages and verify the integrity of third-party modules. Finally, educating developers about secure handling of symbolic links and temporary files in Node.js applications will help prevent similar issues in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-29T16:50:28.395Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6893f7c1ad5a09ad00f58d67
Added to database: 8/7/2025, 12:48:01 AM
Last enriched: 8/7/2025, 1:03:19 AM
Last updated: 8/9/2025, 12:34:45 AM
Views: 12
Related Threats
CVE-2025-8751: Cross Site Scripting in Protected Total WebShield Extension
LowCVE-2025-8750: Cross Site Scripting in macrozheng mall
MediumCVE-2025-8746: Memory Corruption in GNU libopts
MediumCVE-2025-8745: Improper Export of Android Application Components in Weee RICEPO App
MediumCVE-2025-8771
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.