Uncategorized

Node.js Vulnerabilities Expose Windows Apps to Path Traversal and HashDoS

The Node.js project has announced critical security updates across multiple release lines, addressing two high-severity vulnerabilities that pose significant risks to Windows users and applications running on the latest Node.js versions.

These vulnerabilities, identified as CVE-2025-27210 and CVE-2025-27209, affect millions of applications worldwide and require immediate attention from developers and system administrators.

The security releases cover Node.js versions 20.x, 22.x, and 24.x, with patches becoming available on July 15, 2025, highlighting the urgent nature of these security concerns.

The first vulnerability, CVE-2025-27210, represents a critical flaw in Node.js’s path normalization function that specifically targets Windows systems.

The vulnerability allows attackers to bypass existing path traversal protections implemented in the path.normalize() function, potentially enabling unauthorized access to sensitive system resources.

The impact of this vulnerability extends across all active Node.js release lines, including versions 20.x, 22.x, and 24.x, making it a widespread concern for Windows-based applications.

Developers who utilize the path.join API are particularly vulnerable to exploitation, as the flaw specifically targets the mechanism used to construct file paths safely.

The vulnerability was discovered by security researcher oblivionsage and subsequently patched by RafaelGSS, demonstrating the collaborative effort within the Node.js security community to address critical issues promptly.

Node.js Vulnerabilities

The second vulnerability, CVE-2025-27209, introduces a Hash Denial of Service (HashDoS) attack vector through changes in the V8 JavaScript engine’s string hashing implementation.

This vulnerability specifically affects Node.js version 24.x users and stems from the adoption of rapidhash for string hash computation in V8.

The implementation reintroduces a previously known vulnerability that allows attackers to generate hash collisions deliberately, even without knowledge of the hash seed used by the system.

What makes this vulnerability particularly concerning is the philosophical divide between the V8 team and the Node.js project regarding its classification.

While the V8 development team does not consider this a security vulnerability, the Node.js project has elevated it to high severity due to its potential real-world impact on applications that rely heavily on hash-based operations.

Attackers who can control the strings being hashed can exploit this vulnerability to cause performance degradation or denial of service conditions.

The vulnerability was identified by security researcher sharp_edged and resolved through the efforts of contributor targos.

Remediation Efforts

The Node.js security team has released a comprehensive response to address both vulnerabilities simultaneously across multiple release lines.

The patches are available through Node.js versions 20.19.4, 22.17.1, and 24.4.1, ensuring broad coverage across the ecosystem.

The project emphasizes that End-of-Life versions remain vulnerable when security releases occur, reinforcing the importance of maintaining current versions according to the official release schedule.

Organizations using Node.js in production environments should prioritize updating to the latest patched versions immediately.

The Node.js security policy provides detailed guidance for reporting vulnerabilities, while the nodejs-sec mailing list offers ongoing security updates for administrators and developers seeking to maintain secure deployments.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago