{"id":"CVE-2023-23918","details":"A privilege escalation vulnerability exists in Node.js \u003c19.6.1, \u003c18.14.1, \u003c16.19.1 and \u003c14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.","aliases":["BIT-node-2023-23918","BIT-node-min-2023-23918"],"modified":"2026-04-10T04:55:44.072934Z","published":"2023-02-23T20:15:13.920Z","related":["ALSA-2023:1582","ALSA-2023:1583","ALSA-2023:1743","ALSA-2023:2654","ALSA-2023:2655","MGASA-2023-0078","SUSE-SU-2023:0607-1","SUSE-SU-2023:0608-1","SUSE-SU-2023:0609-1","SUSE-SU-2023:0673-1","SUSE-SU-2023:0674-1","SUSE-SU-2023:0715-1","SUSE-SU-2023:0738-1","SUSE-SU-2023:3455-1","openSUSE-SU-2024:12725-1","openSUSE-SU-2024:12726-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230316-0008/"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"last_affected":"354b6a93bd1d66f1833489d6fe01a2b0e8f6aff9"},{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"fixed":"edd64fe5ba20c6c2f53720c672c591f09d9d4ac0"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"49415500bb1bf51a1fade5ea2d03f3988ecabc25"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"fixed":"96a4559f259f109a2abc480caeba12644b8a8fd1"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"last_affected":"8c1dd95f3cc5d91acb9ce8994b3ac45ab927178f"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"7bc2cf7fa9a2016fadb27e042968a69297bd975e"},{"introduced":"cc993fb2760d01457955f5b9ff787d559ed1c34e"},{"fixed":"a9d1e5059f9cc63cafc8e786a7b6332aa7ab3b2b"}],"database_specific":{"versions":[{"introduced":"14.0.0"},{"last_affected":"14.14.0"},{"introduced":"14.0.0"},{"fixed":"14.21.3"},{"introduced":"16.0.0"},{"last_affected":"16.12.0"},{"introduced":"16.0.0"},{"fixed":"16.19.1"},{"introduced":"18.0.0"},{"last_affected":"18.11.0"},{"introduced":"18.0.0"},{"fixed":"18.14.1"},{"introduced":"19.0.0"},{"fixed":"19.6.1"}]}}],"versions":["v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.20.0","v14.20.1","v14.21.0","v14.21.1","v14.21.2","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.17.1","v16.18.0","v16.18.1","v16.19.0","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.10.0","v18.11.0","v18.12.0","v18.12.1","v18.13.0","v18.14.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v18.9.1","v19.0.0","v19.0.1","v19.1.0","v19.2.0","v19.3.0","v19.4.0","v19.5.0","v19.6.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-23918.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}