CVE-2025-27210 Overview
An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX.
This vulnerability affects Windows users of the path.join API.
Critical Impact
This issue allows path traversal attacks, potentially leading to unauthorized access to sensitive directories on Windows systems.
Affected Products
- Node.js (Windows version)
Discovery Timeline
- 2025-07-18 - CVE-2025-27210 published to NVD
- 2025-11-04 - Last updated in NVD database
Technical Details for CVE-2025-27210
Vulnerability Analysis
CVE-2025-27210 is a path traversal vulnerability due to a faulty fix in the Node.js path.join function, which can be exploited when joining Windows device names like CON, PRN, or AUX. This vulnerability resides within the URL parsing logic, allowing malicious actors to traverse directories and potentially access unauthorized files and information.
Root Cause
The root cause is an incomplete patch for CVE-2025-23084, which did not adequately sanitize input paths containing Windows reserved device names in the path.join API.
Attack Vector
Attackers can exploit this vulnerability remotely by supplying crafted URLs or paths through network-accessible Node.js applications.
// Example exploitation code (sanitized)
const path = require('path');
const unsafePath = path.join('C:\', 'CON', 'file.txt');
console.log(`Access file at: ${unsafePath}`);
Detection Methods for CVE-2025-27210
Indicators of Compromise
- Unusual access patterns to Windows reserved device files
- Log entries with suspicious path join operations
Detection Strategies
Implement monitoring for unexpected path resolutions and access attempts to reserved device names through application logs and file access auditing.
Monitoring Recommendations
Use SentinelOne's runtime behavior analysis to detect irregular file system access patterns and flag suspicious path resolutions. Configure alerts for anomalies in file access on Windows platforms.
How to Mitigate CVE-2025-27210
Immediate Actions Required
- Upgrade to the latest patched version of Node.js
- Monitor for unusual path access
Patch Information
Node.js has released security updates to properly address the handling of Windows device names. Ensure systems are updated to the latest Node.js version available from the Node.js official site.
Workarounds
Implement input validation checks to sanitize and disallow reserved device names in file paths prior to passing them to the path.join API.
# Configuration example
node -e "const path = require('path'); let safePath = path.posix.join('/data', 'file.txt'); console.log(safePath);"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

