Description
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.
References (4)
Core 4
Core References
Various Sources x_refsource_misc
https://www.npmjs.com/package/%40node-red/runtime
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/node-red/node-red/releases/tag/1.2.8
Third Party Advisory x_refsource_confirm
https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f
Patch, Third Party Advisory x_refsource_misc
https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456
Scores
CVSS v3
3.5
EPSS
0.0037
EPSS Percentile
58.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (2)
node-red/runtime
0 - 1.2.8npm
nodered/node-red
< 1.2.8
Published
Feb 26, 2021
Tracked Since
Feb 18, 2026