This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nodejs node.js
|
|
| CPEs | cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Nodejs node.js
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 21 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-289 | |
| Metrics |
ssvc
|
Wed, 21 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | nodejs: Nodejs file permissions bypass | |
| Weaknesses | CWE-281 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nodejs
Nodejs nodejs |
|
| Vendors & Products |
Nodejs
Nodejs nodejs |
Tue, 20 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25. | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-22T04:55:29.170Z
Reserved: 2025-08-07T15:00:05.576Z
Link: CVE-2025-55130
Updated: 2026-01-21T20:24:05.733Z
Status : Analyzed
Published: 2026-01-20T21:16:03.177
Modified: 2026-02-03T21:29:50.967
Link: CVE-2025-55130
OpenCVE Enrichment
Updated: 2026-01-21T11:18:42Z