CVE-2025-55130: Vulnerability in nodejs node
A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
AI Analysis
Technical Summary
CVE-2025-55130 is a vulnerability in the Node.js runtime's Permissions model affecting versions 20.19.6, 22.21.1, 24.12.0, and 25.2.1. Node.js introduced a permission system that restricts filesystem access using flags such as `--allow-fs-read` and `--allow-fs-write`, which are intended to confine scripts to specific directories or files. However, this vulnerability allows an attacker to bypass these restrictions by leveraging crafted relative symbolic link (symlink) paths. By chaining multiple directories and symlinks, a script granted access only to the current directory can traverse outside the allowed path boundaries. This traversal enables arbitrary file read and write operations beyond the intended scope, violating the principle of least privilege and breaking isolation guarantees. The flaw is rooted in improper validation of symlink resolution within the permission checks, categorized under CWE-289 (Improper Authentication). Exploitation requires the attacker to have limited privileges on the system and to execute Node.js scripts with the permission flags enabled. No user interaction is necessary, and the attack vector is local. The CVSS v3.0 base score is 7.1, reflecting high severity due to high confidentiality and integrity impact, low attack complexity, and limited privileges required. Although no public exploits are known, the vulnerability could be leveraged to access sensitive configuration files, credentials, or modify critical files, potentially leading to privilege escalation or system compromise. The issue affects a broad range of Node.js versions currently in active use, making it relevant for many development and production environments.
Potential Impact
The vulnerability can have severe consequences for organizations using Node.js with the permission model enabled. Attackers with limited local access can bypass filesystem restrictions, leading to unauthorized disclosure of sensitive data such as credentials, configuration files, or proprietary code. The ability to write arbitrary files may allow attackers to implant malicious code, modify application behavior, or escalate privileges. This undermines the security assumptions of sandboxed or permission-restricted Node.js environments, increasing the risk of lateral movement and persistent compromise. Enterprises relying on Node.js for backend services, serverless functions, or development tooling are at risk, especially if they use the permission flags to enforce strict filesystem access controls. The breach of isolation can also affect containerized or multi-tenant environments where Node.js scripts run with constrained permissions. Although exploitation requires local access, the widespread adoption of Node.js and its use in cloud and on-premises infrastructure amplifies the potential impact globally.
Mitigation Recommendations
1. Immediately update Node.js to a patched version once available from the official Node.js project, as no patch links are currently provided but should be prioritized. 2. Until patches are released, avoid using the `--allow-fs-read` and `--allow-fs-write` permission flags in untrusted or semi-trusted environments. 3. Implement strict access controls at the operating system level to limit who can execute Node.js scripts with elevated permissions. 4. Monitor filesystem access patterns and audit logs for unusual symlink traversals or unexpected file reads/writes. 5. Use containerization or sandboxing technologies to isolate Node.js processes further, reducing the impact of potential escapes. 6. Review and harden symbolic link handling policies in deployment environments to prevent crafted symlink chains. 7. Educate developers and DevOps teams about the risks of relying solely on Node.js permission flags for security and encourage defense-in-depth strategies. 8. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous file access behaviors. 9. Conduct regular security assessments and penetration testing focusing on filesystem permission bypass scenarios in Node.js applications.
Affected Countries
United States, Germany, United Kingdom, India, China, Japan, South Korea, France, Canada, Australia, Netherlands, Brazil, Russia, Israel
CVE-2025-55130: Vulnerability in nodejs node
Description
A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55130 is a vulnerability in the Node.js runtime's Permissions model affecting versions 20.19.6, 22.21.1, 24.12.0, and 25.2.1. Node.js introduced a permission system that restricts filesystem access using flags such as `--allow-fs-read` and `--allow-fs-write`, which are intended to confine scripts to specific directories or files. However, this vulnerability allows an attacker to bypass these restrictions by leveraging crafted relative symbolic link (symlink) paths. By chaining multiple directories and symlinks, a script granted access only to the current directory can traverse outside the allowed path boundaries. This traversal enables arbitrary file read and write operations beyond the intended scope, violating the principle of least privilege and breaking isolation guarantees. The flaw is rooted in improper validation of symlink resolution within the permission checks, categorized under CWE-289 (Improper Authentication). Exploitation requires the attacker to have limited privileges on the system and to execute Node.js scripts with the permission flags enabled. No user interaction is necessary, and the attack vector is local. The CVSS v3.0 base score is 7.1, reflecting high severity due to high confidentiality and integrity impact, low attack complexity, and limited privileges required. Although no public exploits are known, the vulnerability could be leveraged to access sensitive configuration files, credentials, or modify critical files, potentially leading to privilege escalation or system compromise. The issue affects a broad range of Node.js versions currently in active use, making it relevant for many development and production environments.
Potential Impact
The vulnerability can have severe consequences for organizations using Node.js with the permission model enabled. Attackers with limited local access can bypass filesystem restrictions, leading to unauthorized disclosure of sensitive data such as credentials, configuration files, or proprietary code. The ability to write arbitrary files may allow attackers to implant malicious code, modify application behavior, or escalate privileges. This undermines the security assumptions of sandboxed or permission-restricted Node.js environments, increasing the risk of lateral movement and persistent compromise. Enterprises relying on Node.js for backend services, serverless functions, or development tooling are at risk, especially if they use the permission flags to enforce strict filesystem access controls. The breach of isolation can also affect containerized or multi-tenant environments where Node.js scripts run with constrained permissions. Although exploitation requires local access, the widespread adoption of Node.js and its use in cloud and on-premises infrastructure amplifies the potential impact globally.
Mitigation Recommendations
1. Immediately update Node.js to a patched version once available from the official Node.js project, as no patch links are currently provided but should be prioritized. 2. Until patches are released, avoid using the `--allow-fs-read` and `--allow-fs-write` permission flags in untrusted or semi-trusted environments. 3. Implement strict access controls at the operating system level to limit who can execute Node.js scripts with elevated permissions. 4. Monitor filesystem access patterns and audit logs for unusual symlink traversals or unexpected file reads/writes. 5. Use containerization or sandboxing technologies to isolate Node.js processes further, reducing the impact of potential escapes. 6. Review and harden symbolic link handling policies in deployment environments to prevent crafted symlink chains. 7. Educate developers and DevOps teams about the risks of relying solely on Node.js permission flags for security and encourage defense-in-depth strategies. 8. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous file access behaviors. 9. Conduct regular security assessments and penetration testing focusing on filesystem permission bypass scenarios in Node.js applications.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-08-07T15:00:05.576Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 696feab04623b1157c4e3b6c
Added to database: 1/20/2026, 8:50:56 PM
Last enriched: 2/27/2026, 8:20:50 AM
Last updated: 3/24/2026, 11:47:20 PM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.