Memory Exposure in Node.js due to Buffer Allocation Issues
CVE-2025-55131

7.1HIGH

Key Information:

Vendor

Nodejs

Status
Vendor
CVE Published:
20 January 2026

What is CVE-2025-55131?

CVE-2025-55131 is a vulnerability in Node.js, a popular JavaScript runtime environment used for building scalable network applications. The vulnerability arises from issues in the buffer allocation logic within Node.js, specifically when using the vm module with timeout options. When buffer allocations are interrupted, uninitialized memory may become exposed, potentially containing sensitive data from previous operations. This flaw presents significant risks to organizations that rely on Node.js for their applications, as it could lead to the leakage of confidential information, such as tokens and passwords, or cause data corruption if the affected buffers are manipulated. The circumstances for exploitation are nuanced, as they generally depend on precise timing and the execution of untrusted code within the application environment, thereby complicating the security landscape for developers.

Potential impact of CVE-2025-55131

  1. Confidentiality Breaches: The vulnerability can expose sensitive data residing in uninitialized memory, which could be exploited to obtain authentication tokens or passwords. Such compromises could facilitate unauthorized access to various systems and services.

  2. Data Integrity Risks: If uninitialized memory containing previous data is not handled properly, there exists a risk of data corruption. This could lead to critical errors in applications relying on accurate and consistent data processing.

  3. Remote Exploitability: Although exploitation typically requires specific conditions to be favorable, the potential for this vulnerability to become remotely exploitable increases when untrusted input can influence workload and timeout settings. This may broaden the attack surface for malicious actors aiming to compromise applications utilizing Node.js.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

node 20.19.6

node 22.21.1

node 24.12.0

References

CVSS V3.0

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.