Cyber Posture

CVE-2026-21636

Critical

Published: 20 January 2026

Published
20 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0002 6.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21636 is a critical-severity Improper Access Control (CWE-284) vulnerability in Nodejs Node.Js. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the Node.js permission model flaw by identifying, reporting, and applying vendor patches to prevent UDS bypass of network restrictions.

prevent

Enforces approved information flow control policies to block unauthorized connections to arbitrary local sockets via net, tls, or undici/fetch modules.

prevent

Mandates enforcement of access authorizations to maintain the intended security boundary of the Node.js permission model against UDS bypasses.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Directly enables remote exploitation of a public-facing Node.js application to bypass permission boundaries for unauthorized local socket access, resulting in privilege escalation and code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw in Node.js's permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls,…

more

or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution. * The issue affects users of the Node.js permission model on version v25. In the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.

Deeper analysisAI

CVE-2026-21636 is a flaw in Node.js's permission model that allows Unix Domain Socket (UDS) connections to bypass network restrictions when the `--permission` flag is enabled. This vulnerability affects users of the Node.js permission model on version v25. Even without the `--allow-net` option—which remains in the experimental phase—attacker-controlled inputs, such as URLs or socketPath options, can connect to arbitrary local sockets via the net, tls, or undici/fetch modules. This breaks the intended security boundary of the permission model.

The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and results in a scope change (S:C). Attackers can achieve high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), enabling access to privileged local services. Potential outcomes include privilege escalation, data exposure, or local code execution, as reflected in the CVSS v3.1 base score of 10.0.

Mitigation details are provided in the Node.js December 2025 security releases advisory at https://nodejs.org/en/blog/vulnerability/december-2025-security-releases. The issue is associated with CWE-284 (Improper Access Control).

Details

CWE(s)

Affected Products

nodejs
node.js
25.0.0 — 25.3.0

CVEs Like This One

CVE-2025-59464Same product: Nodejs Node.Js
CVE-2026-21637Same product: Nodejs Node.Js
CVE-2025-55130Same product: Nodejs Node.Js
CVE-2025-59466Same product: Nodejs Node.Js
CVE-2025-53763Shared CWE-284
CVE-2026-20750Shared CWE-284
CVE-2026-22011Shared CWE-284
CVE-2025-55261Shared CWE-284
CVE-2026-1525Same vendor: Nodejs
CVE-2025-25500Shared CWE-284

References