CVE-2026-21636

CRITICAL

Node.js 25.0.0-25.2.9 - Improper Access Control via Unix Domain Socket Connection Bypass

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2026-21636. PoCs published by Pauldechassey.

AI-analyzed exploit summary This repository contains a functional exploit for CVE-2026-21636, demonstrating a bypass in Node.js's permission model that allows network access via Unix Domain Sockets and local TCP addresses despite the absence of the --allow-net flag. The exploit leverages dynamic import injection and the V8 inspector to achieve arbitrary code execution in an unsandboxed process.

Description

A flaw in Node.js's permission model allows Unix Domain Socket (UDS) connections to bypass network restrictions when `--permission` is enabled. Even without `--allow-net`, attacker-controlled inputs (such as URLs or socketPath options) can connect to arbitrary local sockets via net, tls, or undici/fetch. This breaks the intended security boundary of the permission model and enables access to privileged local services, potentially leading to privilege escalation, data exposure, or local code execution. * The issue affects users of the Node.js permission model on version v25. In the moment of this vulnerability, network permissions (`--allow-net`) are still in the experimental phase.

Exploits (1)

github WORKING POC
by Pauldechassey · pythonpoc
https://github.com/Pauldechassey/CVE-2026-21636

This repository contains a functional exploit for CVE-2026-21636, demonstrating a bypass in Node.js's permission model that allows network access via Unix Domain Sockets and local TCP addresses despite the absence of the --allow-net flag. The exploit leverages dynamic import injection and the V8 inspector to achieve arbitrary code execution in an unsandboxed process.

Classification
Working Poc 100%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: Node.js v25 (experimental permission model)
No auth needed
Prerequisites: ability to inject arbitrary JavaScript into a Node.js process running under --permission without --allow-net · presence of an unsandboxed Node.js process with V8 inspector enabled
devstral-2 · analyzed Apr 28, 2026 Full analysis →

References (1)

Core 1
Core References

Scores

CVSS v3 10.0
EPSS 0.0002
EPSS Percentile 6.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-284
Status published
Products (1)
nodejs/node.js 25.0.0 - 25.3.0
Published Jan 20, 2026
Tracked Since Feb 18, 2026