-
-
Notifications
You must be signed in to change notification settings - Fork 129
Expand file tree
/
Copy path162.json
More file actions
14 lines (14 loc) · 1.03 KB
/
162.json
File metadata and controls
14 lines (14 loc) · 1.03 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
{
"cve": [
"CVE-2026-21636"
],
"vulnerable": "25.x",
"patched": "^25.3.0",
"ref": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases",
"description": "Node.js permission model bypass via unchecked Unix Domain Socket connections (UDS)",
"overview": "A flaw in Node.js's permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls, or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution.\n\n* The issue affects users of the Node.js permission model on version v25.\n\nIn the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.\n",
"affectedEnvironments": [
"all"
],
"severity": "medium"
}