CVE-2025-55130

EUVD-2026-3338
A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
nodejsnode.js
20.0.0 ≤
𝑥
< 20.20.0
nodejsnode.js
22.0.0 ≤
𝑥
< 22.22.0
nodejsnode.js
24.0.0 ≤
𝑥
< 24.13.0
nodejsnode.js
25.0.0 ≤
𝑥
< 25.3.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bookworm
18.20.4+dfsg-1~deb12u1
fixed
bookworm (security)
18.20.4+dfsg-1~deb12u1
fixed
bullseye
12.22.12~dfsg-1~deb11u4
fixed
bullseye (security)
12.22.12~dfsg-1~deb11u7
fixed
forky
22.22.2+dfsg+~cs22.19.15-3
fixed
sid
22.22.2+dfsg+~cs22.19.15-3
fixed
trixie
vulnerable
trixie (security)
20.19.2+dfsg-1+deb13u2
fixed