CVE-2026-21711
Published:March 30, 2026
Updated:April 23, 2026
A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them. As a result, code running under "--permission" without "--allow-net" can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary. This vulnerability affects Node.js 25.x processes using the Permission Model where "--allow-net" is intentionally omitted to restrict network access. Note that "--allow-net" is currently an experimental feature.
Affected Packages
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.8.2Fix Suggestion:
Update to version v25.8.2Additional Notes
The description of this vulnerability differs from MITRE.
Related ResourcesĀ (1)
Do you need more information?
Contact UsCVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Improper Access Control