CVE-2025-55130
January 20, 2026
A flaw in Node.js’s Permissions model allows attackers to bypass "--allow-fs-read" and "--allow-fs-write" restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
Affected Packages
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v20.0.0 <v20.20.0Fix Suggestion:
Update to version v20.20.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.3.0Fix Suggestion:
Update to version v25.3.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v24.0.0 <v24.13.0Fix Suggestion:
Update to version v24.13.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.22.0Fix Suggestion:
Update to version v22.22.0Additional Notes
The description of this vulnerability differs from MITRE.
Related Resources (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.4
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.1
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Authentication Bypass by Alternate Name
EPSS
Base Score:
0.01