Impact
A flaw in Node.js validates user‑provided HMAC signatures with a non‑constant‑time comparison, leaking timing information proportional to matching bytes. This side‑channel can be exploited by an attacker with high‑resolution timing measurements to infer the correct HMAC value, potentially compromising authentication or message integrity. The weakness aligns with a timing side‑channel definition.
Affected Systems
Node.js releases 20.x, 22.x, 24.x, and 25.x contain the vulnerable comparison logic and are impacted by this flaw.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity. Because no EPSS score or KEV listing is present, the probability of real‑world exploitation remains uncertain, though timing attacks are feasible when an attacker can observe repeated verification requests. The vulnerability does not directly expose secrets, but it can be a stepping‑stone for more destructive attacks if combined with other weaknesses.
OpenCVE Enrichment
Debian DSA