Description
`fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory.

This vulnerability affects all users using the experimental permission model in Node.js 20.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Published: 2023-08-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-36291 `fs.mkdtemp()` and `fs.mkdtempSync()` can be used to bypass the permission model check using a path traversal attack. This flaw arises from a missing check in the fs.mkdtemp() API and the impact is a malicious actor could create an arbitrary directory. This vulnerability affects all users using the experimental permission model in Node.js 20. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
History

Wed, 09 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fedoraproject Fedora
Nodejs Node.js
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-07-03T14:09:41.840Z

Reserved: 2023-05-01T01:00:12.220Z

Link: CVE-2023-32003

cve-icon Vulnrichment

Updated: 2024-08-02T15:03:28.792Z

cve-icon NVD

Status : Modified

Published: 2023-08-15T16:15:10.970

Modified: 2025-07-03T14:15:24.603

Link: CVE-2023-32003

cve-icon Redhat

Severity : Low

Publid Date: 2023-08-09T00:00:00Z

Links: CVE-2023-32003 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses