Bug 2431352 (CVE-2025-55130) - CVE-2025-55130 nodejs: Nodejs file permissions bypass
Summary: CVE-2025-55130 nodejs: Nodejs file permissions bypass
Keywords:
Status: NEW
Alias: CVE-2025-55130
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2431478 2431483 2431486 2431489 2431492 2431494 2431497
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-20 21:03 UTC by OSIDB Bzimport
Modified: 2026-02-18 08:36 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2026:2447 0 None None None 2026-02-10 14:22:52 UTC
Red Hat Product Errata RHBA-2026:2815 0 None None None 2026-02-17 11:23:53 UTC
Red Hat Product Errata RHSA-2026:1842 0 None None None 2026-02-05 15:58:34 UTC
Red Hat Product Errata RHSA-2026:1843 0 None None None 2026-02-05 15:58:23 UTC
Red Hat Product Errata RHSA-2026:2420 0 None None None 2026-02-10 12:45:27 UTC
Red Hat Product Errata RHSA-2026:2421 0 None None None 2026-02-10 12:45:05 UTC
Red Hat Product Errata RHSA-2026:2422 0 None None None 2026-02-10 12:44:49 UTC
Red Hat Product Errata RHSA-2026:2767 0 None None None 2026-02-17 00:39:45 UTC
Red Hat Product Errata RHSA-2026:2768 0 None None None 2026-02-17 00:58:25 UTC
Red Hat Product Errata RHSA-2026:2781 0 None None None 2026-02-17 09:25:21 UTC
Red Hat Product Errata RHSA-2026:2782 0 None None None 2026-02-17 09:26:16 UTC
Red Hat Product Errata RHSA-2026:2783 0 None None None 2026-02-17 09:25:42 UTC
Red Hat Product Errata RHSA-2026:2864 0 None None None 2026-02-18 02:24:26 UTC
Red Hat Product Errata RHSA-2026:2899 0 None None None 2026-02-18 08:36:59 UTC

Description OSIDB Bzimport 2026-01-20 21:03:29 UTC
A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.

Comment 2 errata-xmlrpc 2026-02-05 15:58:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1843 https://access.redhat.com/errata/RHSA-2026:1843

Comment 3 errata-xmlrpc 2026-02-05 15:58:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:1842 https://access.redhat.com/errata/RHSA-2026:1842

Comment 4 errata-xmlrpc 2026-02-10 12:44:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2422 https://access.redhat.com/errata/RHSA-2026:2422

Comment 5 errata-xmlrpc 2026-02-10 12:45:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2421 https://access.redhat.com/errata/RHSA-2026:2421

Comment 6 errata-xmlrpc 2026-02-10 12:45:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2420 https://access.redhat.com/errata/RHSA-2026:2420

Comment 7 errata-xmlrpc 2026-02-17 00:39:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:2767 https://access.redhat.com/errata/RHSA-2026:2767

Comment 8 errata-xmlrpc 2026-02-17 00:58:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:2768 https://access.redhat.com/errata/RHSA-2026:2768

Comment 9 errata-xmlrpc 2026-02-17 09:25:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2781 https://access.redhat.com/errata/RHSA-2026:2781

Comment 10 errata-xmlrpc 2026-02-17 09:25:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2783 https://access.redhat.com/errata/RHSA-2026:2783

Comment 11 errata-xmlrpc 2026-02-17 09:26:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2782 https://access.redhat.com/errata/RHSA-2026:2782

Comment 12 errata-xmlrpc 2026-02-18 02:24:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:2864 https://access.redhat.com/errata/RHSA-2026:2864

Comment 13 errata-xmlrpc 2026-02-18 08:36:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:2899 https://access.redhat.com/errata/RHSA-2026:2899


Note You need to log in before you can comment on or make changes to this bug.