CVE-2025-55132

EUVD-2026-3325
A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
nodejsnode.js
20.0.0 ≤
𝑥
< 20.20.0
nodejsnode.js
22.0.0 ≤
𝑥
< 22.22.0
nodejsnode.js
24.0.0 ≤
𝑥
< 24.13.0
nodejsnode.js
25.0.0 ≤
𝑥
< 25.3.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nodejs
bookworm
18.20.4+dfsg-1~deb12u1
fixed
bookworm (security)
18.20.4+dfsg-1~deb12u1
fixed
bullseye
12.22.12~dfsg-1~deb11u4
fixed
bullseye (security)
12.22.12~dfsg-1~deb11u7
fixed
forky
22.22.2+dfsg+~cs22.19.15-3
fixed
sid
22.22.2+dfsg+~cs22.19.15-3
fixed
trixie
vulnerable
trixie (security)
20.19.2+dfsg-1+deb13u2
fixed