CVE-2026-21711
Received Received - Intake
Permission Bypass in Node.js 25.x UDS Server Operations

Publication date: 2026-03-30

Last updated on: 2026-04-01

Assigner: HackerOne

Description
A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them. As a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary. This vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nodejs node.js 25.x
nodejs node.js From 25.0 (inc) to 26.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in the Node.js Permission Model related to network enforcement. Specifically, Unix Domain Socket (UDS) server operations do not have the required permission checks, unlike other network paths which enforce these checks correctly.

Because of this flaw, code running with the Node.js permission flag `--permission` but without the `--allow-net` flag can still create and expose local inter-process communication (IPC) endpoints. This allows communication with other processes on the same host, bypassing the intended network restriction.

This affects Node.js version 25.x processes that use the Permission Model and intentionally omit the `--allow-net` flag to restrict network access. Note that `--allow-net` is an experimental feature.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized local communication between processes on the same host. Even if network access is restricted by omitting the `--allow-net` permission, an attacker or malicious code could create Unix Domain Socket servers to communicate locally, potentially bypassing intended network restrictions.

This could lead to information leakage, unauthorized data access, or interference between processes that were supposed to be isolated by network permission controls.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that Node.js processes using the Permission Model do not omit the `--allow-net` flag if network restrictions are intended.

Since the flaw allows Unix Domain Socket server operations to bypass permission checks when `--allow-net` is omitted, explicitly including `--allow-net` or avoiding use of the experimental Permission Model feature until a fix is available can reduce risk.

Additionally, review and restrict local IPC endpoint exposure to trusted processes only.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart