{"id":"CVE-2023-30581","details":"The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js","aliases":["BIT-node-2023-30581","BIT-node-min-2023-30581"],"modified":"2026-05-18T05:55:53.064022586Z","published":"2023-11-22T23:28:30.768Z","related":["ALSA-2023:4330","ALSA-2023:4331","ALSA-2023:4536","ALSA-2023:4537","CGA-938h-wpjr-4r95","SUSE-SU-2023:2655-1","SUSE-SU-2023:2662-1","SUSE-SU-2023:2663-1","SUSE-SU-2023:2669-1","SUSE-SU-2023:2861-1","SUSE-SU-2023:3306-1","SUSE-SU-2023:3408-1","SUSE-SU-2023:3455-1","openSUSE-SU-2024:13021-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30581.json","cna_assigner":"hackerone","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"4.0"},{"fixed":"4.*"},{"introduced":"5.0"},{"fixed":"5.*"},{"introduced":"6.0"},{"fixed":"6.*"},{"introduced":"7.0"},{"fixed":"7.*"},{"introduced":"8.0"},{"fixed":"8.*"},{"introduced":"9.0"},{"fixed":"9.*"},{"introduced":"10.0"},{"fixed":"10.*"},{"introduced":"11.0"},{"fixed":"11.*"},{"introduced":"12.0"},{"fixed":"12.*"},{"introduced":"13.0"},{"fixed":"13.*"},{"introduced":"14.0"},{"fixed":"14.*"},{"introduced":"15.0"},{"fixed":"15.*"},{"introduced":"16.0"},{"fixed":"16.20.1"},{"introduced":"17.0"},{"fixed":"17.*"},{"introduced":"18.0"},{"fixed":"18.16.1"},{"introduced":"19.0"},{"fixed":"19.*"},{"introduced":"20.0"},{"fixed":"20.3.1"}]}]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30581.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-30581"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241101-0011/"},{"type":"ARTICLE","url":"https://nodejs.org/en/blog/vulnerability/june-2023-security-releases"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"fixed":"b53c51995380b1f8d642297d848cab6010d2909c"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"8658efe376838821be7f9b4ff25c8bc2e229bb92"},{"introduced":"e7618fb5a5fc25d76b6474e2a6607f04fd6f10e0"},{"fixed":"9869bdc93d7bd8b439c4a2598607ee779483ee53"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","extracted_events":[{"introduced":"16.0.0"},{"fixed":"16.20.1"},{"introduced":"18.0.0"},{"fixed":"18.16.1"},{"introduced":"20.0.0"},{"fixed":"20.3.1"}]}}],"versions":["v20.3.0","v20.2.0","v20.1.0","v20.0.0","v18.16.0","v16.20.0","v18.15.0","v18.14.2","v18.14.1","v16.19.1","v18.14.0","v18.13.0","v16.19.0","v18.12.1","v16.18.1","v18.12.0","v18.11.0","v16.18.0","v18.10.0","v16.17.1","v18.9.1","v18.9.0","v18.8.0","v16.17.0","v18.7.0","v18.6.0","v16.16.0","v18.5.0","v18.4.0","v18.3.0","v16.15.1","v18.2.0","v18.1.0","v16.15.0","v18.0.0","v16.14.2","v16.14.1","v16.14.0","v16.13.2","v16.13.1","v16.13.0","v16.12.0","v16.11.1","v16.11.0","v16.10.0","v16.9.1","v16.9.0","v16.8.0","v16.7.0","v16.6.2","v16.6.1","v16.6.0","v16.5.0","v16.4.2","v16.4.1","v16.4.0","v16.3.0","v16.2.0","v16.1.0","v16.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30581.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}