Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-276 | |
| Metrics |
ssvc
|
Wed, 21 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | nodejs: Nodejs filesystem permissions bypass | |
| Weaknesses | CWE-281 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nodejs
Nodejs nodejs |
|
| Vendors & Products |
Nodejs
Nodejs nodejs |
Tue, 20 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25. | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-21T18:53:03.738Z
Reserved: 2025-08-07T15:00:05.576Z
Link: CVE-2025-55132
Updated: 2026-01-21T18:43:15.476Z
Status : Received
Published: 2026-01-20T21:16:03.430
Modified: 2026-01-21T19:16:04.007
Link: CVE-2025-55132
OpenCVE Enrichment
Updated: 2026-01-21T11:18:47Z