CVE Vulnerabilities

CVE-2023-32559

Published: Aug 24, 2023 | Modified: Nov 04, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(spawn_sync) run arbitrary code, outside of the limits defined in a policy.json file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

Affected Software

NameVendorStart VersionEnd Version
Node.jsNodejs16.0.0 (including)16.20.1 (including)
Node.jsNodejs18.0.0 (including)18.17.0 (including)
Node.jsNodejs20.0.0 (including)20.5.0 (including)
Red Hat Enterprise Linux 8RedHatnodejs:16-8080020230906092006.63b34585*
Red Hat Enterprise Linux 8RedHatnodejs:18-8080020230825111344.63b34585*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatnodejs:16-8060020230906023909.ad008a3a*
Red Hat Enterprise Linux 9RedHatnodejs:18-9020020230825081254.rhel9*
Red Hat Enterprise Linux 9RedHatnodejs-1:16.20.2-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatnodejs-1:16.20.2-1.el9_0*
NodejsUbuntubionic*
NodejsUbuntuesm-apps/jammy*
NodejsUbuntujammy*
NodejsUbuntulunar*
NodejsUbuntumantic*
NodejsUbuntutrusty*
NodejsUbuntuxenial*

References