Description

A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them. As a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary. This vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.

INFO

Published Date :

2026-03-30T19:07:28.526Z

Last Modified :

2026-04-01T15:03:21.612Z

Source :

hackerone
AFFECTED PRODUCTS

The following products are affected by CVE-2026-21711 vulnerability.

Vendors Products
Nodejs
  • Nodejs
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-21711.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact