CVE-2025-55131
January 20, 2026
A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the "vm" module with the timeout option. Under specific timing conditions, buffers allocated with "Buffer.alloc" and other "TypedArray" instances like "Uint8Array" may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.
Affected Packages
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.22.0Fix Suggestion:
Update to version v22.22.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v24.0.0 <v24.13.0Fix Suggestion:
Update to version v24.13.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.3.0Fix Suggestion:
Update to version v25.3.0https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v0.0.1 <v20.20.0Fix Suggestion:
Update to version v20.20.0Related ResourcesĀ (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.6
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
LOW
Weakness Type (CWE)
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
EPSS
Base Score:
0.03