This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 21:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Title | nodejs: Nodejs file permissions bypass | |
| Weaknesses | CWE-281 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 21 Jan 2026 20:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nodejs
Nodejs nodejs |
|
| Vendors & Products |
Nodejs
Nodejs nodejs |
Wed, 21 Jan 2026 05:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25. | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-20T20:41:55.393Z
Reserved: 2025-08-07T15:00:05.576Z
Link: CVE-2025-55130
No data.
Status : Received
Published: 2026-01-20T21:16:03.177
Modified: 2026-01-20T21:16:03.177
Link: CVE-2025-55130
OpenCVE Enrichment
Updated: 2026-01-21T20:18:42Z