Intel

AIKIDO-2026-10033

node is vulnerable to Improper Access Control

Improper Access ControlCVE-2026-21636

50

Medium Risk

This Affects:

OSnode
0.0.1 - 20.19.6
Fixed in 20.20.0
21.0.0 - 22.21.1
Fixed in 22.22.0
23.0.0 - 24.12.0
Fixed in 24.13.0
25.0.0 - 25.2.0
Fixed in 25.3.0

TL;DR

Affected versions of the package allow a permissions bypass in the Node.js permission model, where Unix Domain Socket (UDS) connections are not properly restricted when --permission is enabled. Even without --allow-net, attacker-controlled inputs such as URLs or socketPath options can be used with net, tls, or undici/fetch to connect to arbitrary local sockets. This breaks the intended security boundary, enabling unauthorized access to privileged local services and potentially leading to privilege escalation, data exposure, or local code execution.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

node is vulnerable to Improper Access Control in versions 25.0.0 - 25.2.0, 23.0.0 - 24.12.0, 21.0.0 - 22.21.1 and 0.0.1 - 20.19.6.

How to fix this

Upgrade the node library to a patch version.