Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55130: Vulnerability in nodejs node

0
High
VulnerabilityCVE-2025-55130cvecve-2025-55130
Published: Tue Jan 20 2026 (01/20/2026, 20:41:55 UTC)
Source: CVE Database V5
Vendor/Project: nodejs
Product: node

Description

A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:20:50 UTC

Technical Analysis

CVE-2025-55130 is a vulnerability in the Node.js runtime's Permissions model affecting versions 20.19.6, 22.21.1, 24.12.0, and 25.2.1. Node.js introduced a permission system that restricts filesystem access using flags such as `--allow-fs-read` and `--allow-fs-write`, which are intended to confine scripts to specific directories or files. However, this vulnerability allows an attacker to bypass these restrictions by leveraging crafted relative symbolic link (symlink) paths. By chaining multiple directories and symlinks, a script granted access only to the current directory can traverse outside the allowed path boundaries. This traversal enables arbitrary file read and write operations beyond the intended scope, violating the principle of least privilege and breaking isolation guarantees. The flaw is rooted in improper validation of symlink resolution within the permission checks, categorized under CWE-289 (Improper Authentication). Exploitation requires the attacker to have limited privileges on the system and to execute Node.js scripts with the permission flags enabled. No user interaction is necessary, and the attack vector is local. The CVSS v3.0 base score is 7.1, reflecting high severity due to high confidentiality and integrity impact, low attack complexity, and limited privileges required. Although no public exploits are known, the vulnerability could be leveraged to access sensitive configuration files, credentials, or modify critical files, potentially leading to privilege escalation or system compromise. The issue affects a broad range of Node.js versions currently in active use, making it relevant for many development and production environments.

Potential Impact

The vulnerability can have severe consequences for organizations using Node.js with the permission model enabled. Attackers with limited local access can bypass filesystem restrictions, leading to unauthorized disclosure of sensitive data such as credentials, configuration files, or proprietary code. The ability to write arbitrary files may allow attackers to implant malicious code, modify application behavior, or escalate privileges. This undermines the security assumptions of sandboxed or permission-restricted Node.js environments, increasing the risk of lateral movement and persistent compromise. Enterprises relying on Node.js for backend services, serverless functions, or development tooling are at risk, especially if they use the permission flags to enforce strict filesystem access controls. The breach of isolation can also affect containerized or multi-tenant environments where Node.js scripts run with constrained permissions. Although exploitation requires local access, the widespread adoption of Node.js and its use in cloud and on-premises infrastructure amplifies the potential impact globally.

Mitigation Recommendations

1. Immediately update Node.js to a patched version once available from the official Node.js project, as no patch links are currently provided but should be prioritized. 2. Until patches are released, avoid using the `--allow-fs-read` and `--allow-fs-write` permission flags in untrusted or semi-trusted environments. 3. Implement strict access controls at the operating system level to limit who can execute Node.js scripts with elevated permissions. 4. Monitor filesystem access patterns and audit logs for unusual symlink traversals or unexpected file reads/writes. 5. Use containerization or sandboxing technologies to isolate Node.js processes further, reducing the impact of potential escapes. 6. Review and harden symbolic link handling policies in deployment environments to prevent crafted symlink chains. 7. Educate developers and DevOps teams about the risks of relying solely on Node.js permission flags for security and encourage defense-in-depth strategies. 8. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous file access behaviors. 9. Conduct regular security assessments and penetration testing focusing on filesystem permission bypass scenarios in Node.js applications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-08-07T15:00:05.576Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 696feab04623b1157c4e3b6c

Added to database: 1/20/2026, 8:50:56 PM

Last enriched: 2/27/2026, 8:20:50 AM

Last updated: 3/24/2026, 11:47:20 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses