On Tue, Jul 15, 2025 at 03:39:08PM -0700, Rafael Gonzaga wrote: > The planned security releases are now available. You can read more about > the details at > https://nodejs.org/en/blog/vulnerability/july-2025-security-releases
I include below the full content from: https://raw.githubusercontent.com/nodejs/nodejs.org/refs/heads/main/apps/site/pages/en/blog/vulnerability/july-2025-security-releases.md Alexander --- date: 2025-07-15T00:00:00.000Z category: vulnerability title: Tuesday, July 15, 2025 Security Releases slug: july-2025-security-releases layout: blog-post author: The Node.js Project --- ## Security releases available Updates are now available for the 24.x, 22.x, 20.x Node.js release lines for the following issues. ## Windows Device Names (CON, PRN, AUX) Bypass Path Traversal Protection in path.normalize() (CVE-2025-27210) - (high) An incomplete fix has been identified for CVE-2025-23084 in Node.js, specifically affecting Windows device names like CON, PRN, and AUX. This vulnerability affects Windows users of `path.join` API. Impact: - This vulnerability affects all users in active release lines: 20.x, 22.x, 24.x Thank you, to oblivionsage for reporting this vulnerability and thank you RafaelGSS for fixing it. ## HashDoS in V8 (CVE-2025-27209) - (high) The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed. While the V8 team does not classify this as a security vulnerability, the Node.js project considers it one due to its potential impact in real-world scenarios. - This vulnerability affects Node.js v24.x users. Impact: - This vulnerability affects all users in active release lines: 24.x Thank you, to sharp_edged for reporting this vulnerability and thank you targos for fixing it. ## Downloads and release details - [Node.js v20.19.4](/blog/release/v20.19.4/) - [Node.js v22.17.1](/blog/release/v22.17.1/) - [Node.js v24.4.1](/blog/release/v24.4.1/) # Summary The Node.js project will release new versions of the 24.x, 22.x, 20.x releases lines on or shortly after, Tuesday, July 15, 2025 in order to address: - 2 high severity issues. ## Impact The 24.x release line of Node.js is vulnerable to 2 high severity issues. The 22.x release line of Node.js is vulnerable to 1 high severity issues. The 20.x release line of Node.js is vulnerable to 1 high severity issues. It's important to note that End-of-Life versions are always affected when a security release occurs. To ensure your system's security, please use an up-to-date version as outlined in our [Release Schedule](https://github.com/nodejs/release#release-schedule). ## Release timing Releases will be available on, or shortly after, Tuesday, July 15, 2025. ## Contact and future updates The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/master/SECURITY.md> if you wish to report a vulnerability in Node.js. Subscribe to the low-volume announcement-only nodejs-sec mailing list at <https://groups.google.com/forum/#!forum/nodejs-sec> to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.