{"id":"CVE-2023-32002","details":"The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.\n\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.\n\nPlease note that at the time this CVE was issued, the policy is an experimental feature of Node.js.","aliases":["BIT-node-2023-32002","BIT-node-min-2023-32002"],"modified":"2026-05-15T04:06:53.927298236Z","published":"2023-08-21T16:52:42.147Z","related":["ALSA-2023:5360","ALSA-2023:5362","ALSA-2023:5363","ALSA-2023:5532","CGA-hgw9-hf5g-5wh5","SUSE-SU-2023:3306-1","SUSE-SU-2023:3355-1","SUSE-SU-2023:3356-1","SUSE-SU-2023:3378-1","SUSE-SU-2023:3379-1","SUSE-SU-2023:3400-1","SUSE-SU-2023:3408-1","SUSE-SU-2023:3455-1","openSUSE-SU-2024:13117-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32002.json","unresolved_ranges":[{"extracted_events":[{"introduced":"4.0"},{"fixed":"4.*"},{"introduced":"5.0"},{"fixed":"5.*"},{"introduced":"6.0"},{"fixed":"6.*"},{"introduced":"7.0"},{"fixed":"7.*"},{"introduced":"8.0"},{"fixed":"8.*"},{"introduced":"9.0"},{"fixed":"9.*"},{"introduced":"10.0"},{"fixed":"10.*"},{"introduced":"11.0"},{"fixed":"11.*"},{"introduced":"12.0"},{"fixed":"12.*"},{"introduced":"13.0"},{"fixed":"13.*"},{"introduced":"14.0"},{"fixed":"14.*"},{"introduced":"15.0"},{"fixed":"15.*"},{"introduced":"16.0"},{"fixed":"16.20.2"},{"introduced":"17.0"},{"fixed":"17.*"},{"introduced":"18.0"},{"fixed":"18.17.1"},{"introduced":"19.0"},{"fixed":"19.*"},{"introduced":"20.0"},{"fixed":"20.5.1"}],"source":"AFFECTED_FIELD"}],"cna_assigner":"hackerone"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1960870"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32002.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32002"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230915-0009/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}