ALPINE-CVE-2025-55130

Source
https://security.alpinelinux.org/vuln/CVE-2025-55130
Import Source
https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-55130.json
JSON Data
https://api.osv.dev/v1/vulns/ALPINE-CVE-2025-55130
Upstream
  • CVE-2025-55130
Published
2026-01-20T21:16:03.177Z
Modified
2026-01-23T17:15:53.755884Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

A flaw in Node.js’s Permissions model allows attackers to bypass --allow-fs-read and --allow-fs-write restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.

References

Affected packages

Alpine:v3.22 / nodejs

Package

Name
nodejs
Purl
pkg:apk/alpine/nodejs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
22.22.0-r0

Affected versions

22.*

22.11.0-r0
22.11.0-r1
22.11.0-r2
22.13.1-r0
22.13.1-r1
22.13.1-r2
22.13.1-r3
22.13.1-r4
22.13.1-r5
22.16.0-r0
22.16.0-r1
22.16.0-r2

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-55130.json"

Alpine:v3.23 / nodejs

Package

Name
nodejs
Purl
pkg:apk/alpine/nodejs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
24.13.0-r0

Affected versions

22.*

22.11.0-r0
22.11.0-r1
22.11.0-r2
22.13.1-r0
22.13.1-r1
22.13.1-r2
22.13.1-r3
22.13.1-r4
22.13.1-r5
22.16.0-r0
22.16.0-r1
22.16.0-r2
22.16.0-r3
22.19.0-r3
22.19.0-r4
22.21.0-r0

24.*

24.11.1-r0

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2025-55130.json"