Node.js Vulnerability Affecting Windows Device Names
CVE-2025-27210

7.5HIGH

Key Information:

Vendor

Nodejs

Vendor
CVE Published:
18 July 2025

Badges

📈 Score: 915👾 Exploit Exists🟡 Public PoC

What is CVE-2025-27210?

CVE-2025-27210 is a notable vulnerability associated with the Node.js runtime platform, specifically impacting its handling of Windows device names, such as CON, PRN, and AUX. Node.js is widely used for building server-side applications and microservices due to its event-driven architecture and non-blocking I/O capabilities. The identified vulnerability stems from an incomplete fix for a prior issue, CVE-2025-23084, affecting the path.join API utilized in Node.js applications running on Windows. This flaw allows attackers to craft malicious input that could lead to misinterpretation of file paths, ultimately undermining the reliability and security of applications built on this platform. Organizations relying on Node.js for their critical applications may face significant operational and security challenges should this vulnerability be exploited.

Potential impact of CVE-2025-27210

  1. Unauthorized Access to Sensitive Data: The vulnerability could permit unauthorized users to access files or directories that should be off-limits, potentially leading to data breaches or leakage of sensitive information.

  2. Service Disruption: Exploiting this flaw might result in service interruptions, as attackers could manipulate file paths to trigger unexpected behaviors in applications, leading to crashes or degraded performance.

  3. Increased Risk of Malware Attacks: The weakness may be leveraged by cybercriminals to execute malicious code or deploy malware within affected environments, increasing the potential for further compromises or ransomware attacks against targeted organizations.

Affected Version(s)

node 20.0.0 < 20.19.4

node 22.0.0 < 22.17.1

node 24.0.0 < 24.4.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.0

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.
CVE-2025-27210 : Node.js Vulnerability Affecting Windows Device Names