A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
References
| Link | Resource |
|---|---|
| https://nodejs.org/en/blog/vulnerability/december-2025-security-releases | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Feb 2026, 21:29
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CPE | cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | |
| References | () https://nodejs.org/en/blog/vulnerability/december-2025-security-releases - Release Notes, Vendor Advisory | |
| First Time |
Nodejs
Nodejs node.js |
Information
Published : 2026-01-20 21:16
Updated : 2026-02-03 21:29
NVD link : CVE-2025-55130
Mitre link : CVE-2025-55130
CVE.ORG link : CVE-2025-55130
JSON object : View
Products Affected
nodejs
- node.js
CWE
CWE-289
Authentication Bypass by Alternate Name
