The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2m8v-572m-ff2v Command Injection Vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Thu, 06 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-01-18'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-21T23:35:26.173Z

Reserved: 2020-12-22T00:00:00.000Z

Link: CVE-2021-21315

cve-icon Vulnrichment

Updated: 2024-08-03T18:09:15.260Z

cve-icon NVD

Status : Modified

Published: 2021-02-16T17:15:13.050

Modified: 2025-10-22T00:17:21.670

Link: CVE-2021-21315

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.