CVE Vulnerabilities

CVE-2023-30581

Published: Nov 23, 2023 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js

Affected Software

NameVendorStart VersionEnd Version
Node.jsNodejs16.0.0 (including)16.20.1 (excluding)
Node.jsNodejs18.0.0 (including)18.16.1 (excluding)
Node.jsNodejs20.0.0 (including)20.3.1 (excluding)
Red Hat Enterprise Linux 8RedHatnodejs:18-8080020230718130356.63b34585*
Red Hat Enterprise Linux 8RedHatnodejs:16-8080020230718141521.63b34585*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatnodejs:16-8060020230906023909.ad008a3a*
Red Hat Enterprise Linux 9RedHatnodejs:18-9020020230717125503.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.20.1-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.20.2-1.el9_0*
NodejsUbuntubionic*
NodejsUbuntukinetic*
NodejsUbuntulunar*
NodejsUbuntumantic*
NodejsUbuntutrusty*
NodejsUbuntuxenial*

References