The Node.js project has released critical security patches addressing multiple vulnerabilities across all active release lines. This comprehensive guide covers the CVEs, update procedures, and enterprise deployment recommendations.
# Check your current version node --version # Update via nvm (recommended) nvm install 22.12.0 # LTS nvm install 20.18.1 # Maintenance LTS # Update via npm (global) npm cache clean --force npm install -g n n lts # Install latest LTS # Verify update node --version && npm audit
The following versions contain the December 2025 security patches. Upgrade to these specific versions or later:
| Release Line | Patched Version | Status | EOL Date |
|---|---|---|---|
| Node.js 25.x | 25.1.0 |
Current | April 2026 |
| Node.js 24.x | 24.2.0 |
Pending LTS | April 2028 |
| Node.js 22.x | 22.12.0 |
Active LTS | April 2027 |
| Node.js 20.x | 20.18.1 |
Maintenance LTS | April 2026 |
Enterprise Recommendation: Production systems should use Node.js 22.x (Active LTS) or 20.x (Maintenance LTS) for optimal stability and security support.
The December 2025 security release addresses multiple high-severity vulnerabilities affecting Node.js core modules:
A vulnerability in the HTTP/2 implementation allows attackers to inject malformed stream frames, potentially causing denial of service or unauthorized data access in multi-tenant environments.
Improper sanitization of symlink paths in certain fs module functions could allow an attacker to read or write files outside the intended directory scope.
The inspector/debugger module is vulnerable to DNS rebinding attacks when exposed on non-localhost interfaces, potentially allowing remote code execution.
A memory management issue in the TLS implementation could leak session ticket encryption keys across process boundaries in clustered Node.js applications.
# Check Node.js version node --version # Check npm version npm --version # List all installed Node.js versions (nvm) nvm list
Document your current version before upgrading. This helps with rollback if needed.
# Install specific patched version nvm install 22.12.0 nvm use 22.12.0 nvm alias default 22.12.0
# Install n globally npm install -g n # Install LTS version sudo n lts
brew update brew upgrade node
sudo apt update sudo apt install nodejs
# Verify Node.js version node --version # Should show 22.12.0 or your target version # Clear npm cache npm cache clean --force # Reinstall dependencies rm -rf node_modules package-lock.json npm install # Run security audit npm audit # Fix vulnerabilities automatically (when safe) npm audit fix
Always run npm audit after updating to catch vulnerable dependencies.
# Run your test suite npm test # Run integration tests npm run test:integration # Start in development mode npm run dev # Run health checks curl http://localhost:3000/health
Ensure all tests pass and the application functions correctly before deploying to production.
If you're running Node.js in Docker containers, update your base images immediately:
# Update Dockerfile base image FROM node:22.12.0-alpine # LTS with security patches # Or use specific SHA for reproducibility FROM node:22.12.0-alpine@sha256:abc123... # Rebuild and push docker build -t myapp:latest . docker push myapp:latest # Restart containers docker-compose down && docker-compose up -d
Pro Tip: Use node:22-alpine for automatic minor version updates, or pin to exact versions like node:22.12.0-alpine for reproducible builds.
--inspect=false)--disable-proto=delete flagNODE_ENV=production'use strict')The December 2025 Node.js security releases address critical vulnerabilities that could impact production applications. Organizations running Node.js should prioritize these updates, particularly for internet-facing services using HTTP/2 or TLS.
npm audit after updating