{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:45:09.000","vulnerabilities":[{"cve":{"id":"CVE-2025-23084","sourceIdentifier":"support@hackerone.com","published":"2025-01-28T05:15:11.267","lastModified":"2025-11-04T22:16:07.090","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.\r\n\r\nOn Windows, a path that does not start with the file separator is treated as relative to the current directory. \r\n\r\nThis vulnerability affects Windows users of `path.join` API."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Node.js que afecta específicamente a la gestión de nombres de unidades en el entorno Windows. Algunas funciones de Node.js no tratan los nombres de unidades como especiales en Windows. Como resultado, aunque Node.js asume una ruta relativa, en realidad hace referencia al directorio raíz. En Windows, una ruta que no comienza con el separador de archivos se trata como relativa al directorio actual. Esta vulnerabilidad afecta a los usuarios de Windows de la API `path.join`."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":4.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"18.0","versionEndExcluding":"18.20.6","matchCriteriaId":"45318EFE-37E9-464A-9030-CA2EE2992573"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"20.0","versionEndExcluding":"20.18.2","matchCriteriaId":"9F4B1228-6F93-4D5E-AEE8-9233855A6B7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"22.0","versionEndExcluding":"22.13.1","matchCriteriaId":"D4403A45-58F3-44F8-9DE2-05A1A4B449B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"23.0","versionEndExcluding":"23.6.1","matchCriteriaId":"44BC2512-4267-437B-B2A3-C62A9296BE26"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://nodejs.org/en/blog/vulnerability/january-2025-security-releases","source":"support@hackerone.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/07/22/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20250321-0003/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}