A flaw in Node.js's permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls, or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution.

* The issue affects users of the Node.js permission model on version v25.

In the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 21:15:00 +0900

Type Values Removed Values Added
Title nodejs: Nodejs network segmentation bypass
Weaknesses CWE-281
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}

threat_severity

Moderate


Wed, 21 Jan 2026 20:30:00 +0900

Type Values Removed Values Added
First Time appeared Nodejs
Nodejs nodejs
Vendors & Products Nodejs
Nodejs nodejs

Wed, 21 Jan 2026 05:45:00 +0900

Type Values Removed Values Added
Description A flaw in Node.js's permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls, or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution. * The issue affects users of the Node.js permission model on version v25. In the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.
References
Metrics cvssV3_0

{'score': 5.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-01-20T20:41:55.700Z

Reserved: 2026-01-01T15:00:02.339Z

Link: CVE-2026-21636

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-20T21:16:05.813

Modified: 2026-01-20T21:16:05.813

Link: CVE-2026-21636

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-20T20:41:55Z

Links: CVE-2026-21636 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-01-21T20:18:49Z

Weaknesses