Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-21715
March 23, 2026
A flaw in Node.js Permission Model filesystem enforcement leaves fs.realpathSync.native() without the required read permission checks, while all comparable filesystem functions correctly enforce them. As a result, code running under --permission with restricted --allow-fs-read can still use fs.realpathSync.native() to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories. This vulnerability affects 20.x, 22.x, 24.x, and 25.x processes using the Permission Model where --allow-fs-read is intentionally restricted.
Affected Packages
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.8.2
Fix Suggestion:
Update to version v25.8.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.22.2
Fix Suggestion:
Update to version v22.22.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.22.2
Fix Suggestion:
Update to version v22.22.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v20.0.0 <v20.20.2
Fix Suggestion:
Update to version v20.20.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v24.0.0 <v24.14.1
Fix Suggestion:
Update to version v24.14.1
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v20.0.0 <v20.20.2
Fix Suggestion:
Update to version v20.20.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.22.2
Fix Suggestion:
Update to version v22.22.2
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v24.0.0 <v24.14.1
Fix Suggestion:
Update to version v24.14.1
https://github.com/nodejs/node.git (GITHUB):
Affected version(s) >=v20.0.0 <v20.20.2
Fix Suggestion:
Update to version v20.20.2
Do you need more information?
Contact Us
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE