Skip to content

Top Stories

Top Stories

Primary Menu
  • Breaking News
  • UNIT CONVERTER
  • QR Code Generator
  • SEO META TAG GENERATOR
  • Background Remover Tool
  • Image Enhancer Tool
  • Image Converter Tool
  • Image Compressor Tool
  • Keyword Research Tool
  • Paint Tool
  • About Us
  • Contact Us
  • Privacy Policy
HOME PAGE
  • Home
  • Uncategorized
  • Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
  • Uncategorized

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS

VedVision HeadLines July 16, 2025
Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS


The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant risks to Windows applications and could enable denial-of-service attacks.

The vulnerabilities, identified as CVE-2025-27210 and CVE-2025-27209, affect active Node.js release lines including versions 20.x, 22.x, and 24.x, prompting immediate security patches released on July 15, 2025.

Critical Windows Path Traversal Vulnerability

Security researchers have identified that attackers can exploit Windows device names to bypass path traversal protection mechanisms, potentially allowing unauthorized access to system resources or sensitive file locations.

CVE ID Title Severity Affected Versions Platform Reporter
CVE-2025-27210 Windows Device Names (CON, PRN, AUX) Bypass Path Traversal Protection in path.normalize() High 20.x, 22.x, 24.x Windows oblivionsage
CVE-2025-27209 HashDoS in V8 High 24.x All sharp_edged

The vulnerability affects all users across active release lines, making it a widespread concern for Windows-based Node.js applications.

The issue was discovered by security researcher oblivionsage and subsequently addressed by RafaelGSS, highlighting the collaborative nature of Node.js security maintenance.

This vulnerability demonstrates how incomplete security fixes can create persistent attack vectors, emphasizing the importance of thorough security testing and validation.

The second vulnerability, CVE-2025-27209, introduces a HashDoS (Hash Denial-of-Service) vulnerability through changes in the V8 JavaScript engine’s string hashing implementation.

The V8 release used in Node.js v24.0.0 modified string hash computation to use rapidhash, inadvertently reintroducing a hash collision vulnerability.

This implementation flaw allows attackers who can control input strings to generate numerous hash collisions without requiring knowledge of the hash seed.

Such attacks can lead to performance degradation and potential denial-of-service conditions in applications processing user-controlled string data.

Notably, while the V8 development team does not classify this as a security vulnerability, the Node.js project has taken a more conservative approach, recognizing its potential impact in real-world deployment scenarios.

The vulnerability specifically affects Node.js v24.x users and was reported by sharp_edged, with fixes implemented by targos.

The Node.js project has released updated versions addressing these vulnerabilities: Node.js v20.19.4, v22.17.1, and v24.4.1.

Organizations running Node.js applications, particularly those on Windows systems or using v24.x releases, should prioritize immediate updates to mitigate these security risks.

The Node.js security team emphasizes that End-of-Life versions remain vulnerable during security releases, reinforcing the importance of maintaining current versions according to the official release schedule.

Users can stay informed about future security updates through the nodejs-sec mailing list and should follow the established vulnerability reporting process outlined in the project’s security policy.

Stay Updated on Daily Cybersecurity News . Follow us on Google News, LinkedIn, and X.



Source link

Continue Reading

Previous: Bitcoin Profit-Taking Spikes Without Price Drop
Next: Trump reaps $50bn tariff haul as world ‘chickens out’

Related News

Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks
  • Uncategorized

Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks

VedVision HeadLines July 16, 2025
Matador Technologies Plans To Buy 6,000 Bitcoin By 2027
  • Uncategorized

Matador Technologies Plans To Buy 6,000 Bitcoin By 2027

VedVision HeadLines July 16, 2025
Windows Secure Boot Certificate Expired in June, Microsoft Issues Warning
  • Uncategorized

Windows Secure Boot Certificate Expired in June, Microsoft Issues Warning

VedVision HeadLines July 16, 2025

Recent Posts

  • Sisters Princess Leonor of Spain and Infanta Sofia embrace during emotional family reunion
  • Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks
  • Small Crypto Trader Turns $6.8K Into $1.5M With High-Risk Strategy
  • TVK to hold mega meet in Madurai this Aug – News Today
  • Matador Technologies Plans To Buy 6,000 Bitcoin By 2027

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025

Categories

  • Current Affairs
  • Shopping
  • Uncategorized

You may have missed

Sisters Princess Leonor of Spain and Infanta Sofia embrace during emotional family reunion
  • Current Affairs

Sisters Princess Leonor of Spain and Infanta Sofia embrace during emotional family reunion

VedVision HeadLines July 16, 2025
Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks
  • Uncategorized

Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks

VedVision HeadLines July 16, 2025
Small Crypto Trader Turns .8K Into .5M With High-Risk Strategy
  • Current Affairs

Small Crypto Trader Turns $6.8K Into $1.5M With High-Risk Strategy

VedVision HeadLines July 16, 2025
TVK to hold mega meet in Madurai this Aug – News Today
  • Current Affairs

TVK to hold mega meet in Madurai this Aug – News Today

VedVision HeadLines July 16, 2025
Copyright © All rights reserved. | MoreNews by AF themes.