Company Details
node-js
535
378,837
5112
nodejs.org
0
NOD_1403680
In-progress

Node.js Company CyberSecurity Posture
nodejs.orgNode.js is a JavaScript runtime, used worldwide by millions.
Company Details
node-js
535
378,837
5112
nodejs.org
0
NOD_1403680
In-progress
Between 750 and 799

Node.js Global Score (TPRM)XXXX

Description: Security researchers discovered a critical TOCTOU vulnerability in Node.js’s CI/CD infrastructure that allowed attackers to execute malicious code on internal Jenkins agents. An adversary could submit a legitimate pull request, obtain approval and the request-ci label, then push new commits with forged timestamps to bypass code review checks. Once inside the pipeline, the malicious payload could establish persistence in the Jenkins environment, harvest internal credentials and move laterally across build and test systems. A parallel flaw in the commit-queue process might have enabled injection of unreviewed code directly into the main branch, threatening the entire Node.js supply chain. The Node.js security team swiftly restricted access to vulnerable Jenkins runs, rebuilt 24 compromised machines, disabled affected GitHub workflows and replaced timestamp validation with SHA-based checks. They also audited 140 Jenkins jobs to remediate gaps. Although no customer data breach was reported, the incident exposed critical internal infrastructure, credentials and trust in the build process, forcing rapid incident response and infrastructure overhaul.


Node.js has 63.93% more incidents than the average of same-industry companies with at least one recorded incident.
Node.js has 26.58% more incidents than the average of all companies with at least one recorded incident.
Node.js reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Node.js cyber incidents detection timeline including parent company and subsidiaries

Node.js is a JavaScript runtime, used worldwide by millions.

VMware by Broadcom delivers software that unifies and streamlines hybrid cloud environments for the world’s most complex organizations. By combining public-cloud scale and agility with private-cloud security and performance, we empower our customers to modernize, optimize and protect their apps an

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150

At Agoda, we bridge the world through travel. We aim to make it easy and rewarding for more travelers to explore and experience the amazing world we live in. We do so by enabling more people to see the world for less – with our best-value deals across our 4,700,000+ hotels and holiday properties, 13

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod
As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente
Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic
SS&C is a leading global provider of mission-critical, cloud-based software and solutions for the financial and healthcare industries. Named to the Fortune 1000 list as a top U.S. company based on revenue, SS&C (NASDAQ: SSNC) is a trusted provider to more than 20,000 financial services and healthcar
.png)
A team of cybersecurity researchers at Sysdig, a firm specialising in protecting cloud and container-based apps, has found a new malware...
Here's an overview of some of last week's most interesting news, articles, interviews and videos: Creative cybersecurity strategies for.
Tsundere represents a significant shift in botnet tactics, leveraging the power of legitimate Node.js packages and blockchain technology to...
A Russian-speaking threat actor attributed to the username "koneko" has resurfaced with a sophisticated new botnet named Tsundere,...
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's targeting Windows users. Active since mid-2025,...
Stealit malware uses Node.js SEA to evade detection, spreading via fake game and VPN installers on Discord and Mediafire platforms.
Security researchers have identified a new, active campaign of the Stealit malware that uses an experimental Node.js feature.
Cybersecurity researchers have discovered a new 'Stealit' info-stealing malware campaign that exploits an experimental Node.js feature.
Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Node.js is https://nodejs.org/en/.
According to Rankiteo, Node.js’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, Node.js currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Node.js is not certified under SOC 2 Type 1.
According to Rankiteo, Node.js does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Node.js is not listed as GDPR compliant.
According to Rankiteo, Node.js does not currently maintain PCI DSS compliance.
According to Rankiteo, Node.js is not compliant with HIPAA regulations.
According to Rankiteo,Node.js is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Node.js operates primarily in the Software Development industry.
Node.js employs approximately 535 people worldwide.
Node.js presently has no subsidiaries across any sectors.
Node.js’s official LinkedIn profile has approximately 378,837 followers.
Node.js is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Node.js does not have a profile on Crunchbase.
Yes, Node.js maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/node-js.
As of December 27, 2025, Rankiteo reports that Node.js has experienced 1 cybersecurity incidents.
Node.js has an estimated 27,889 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with restricted access to vulnerable jenkins runs, containment measures with rebuilt 24 compromised machines, containment measures with disabled affected github workflows, and remediation measures with replaced timestamp validation with sha-based checks, remediation measures with audited 140 jenkins jobs to remediate gaps..
Title: TOCTOU Vulnerability in Node.js CI/CD Infrastructure
Description: Security researchers discovered a critical TOCTOU vulnerability in Node.js’s CI/CD infrastructure that allowed attackers to execute malicious code on internal Jenkins agents. An adversary could submit a legitimate pull request, obtain approval and the request-ci label, then push new commits with forged timestamps to bypass code review checks. Once inside the pipeline, the malicious payload could establish persistence in the Jenkins environment, harvest internal credentials and move laterally across build and test systems. A parallel flaw in the commit-queue process might have enabled injection of unreviewed code directly into the main branch, threatening the entire Node.js supply chain. The Node.js security team swiftly restricted access to vulnerable Jenkins runs, rebuilt 24 compromised machines, disabled affected GitHub workflows and replaced timestamp validation with SHA-based checks. They also audited 140 Jenkins jobs to remediate gaps. Although no customer data breach was reported, the incident exposed critical internal infrastructure, credentials and trust in the build process, forcing rapid incident response and infrastructure overhaul.
Type: Vulnerability Exploitation
Attack Vector: CI/CD Pipeline
Vulnerability Exploited: TOCTOU Vulnerability
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: Internal Jenkins agentsBuild and test systems

Entity Name: Node.js
Entity Type: Open Source Project
Industry: Software Development

Containment Measures: Restricted access to vulnerable Jenkins runsRebuilt 24 compromised machinesDisabled affected GitHub workflows
Remediation Measures: Replaced timestamp validation with SHA-based checksAudited 140 Jenkins jobs to remediate gaps
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Replaced timestamp validation with SHA-based checks, Audited 140 Jenkins jobs to remediate gaps, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by restricted access to vulnerable jenkins runs, rebuilt 24 compromised machines, disabled affected github workflows and .
Most Significant System Affected: The most significant system affected in an incident was Internal Jenkins agentsBuild and test systems.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Restricted access to vulnerable Jenkins runsRebuilt 24 compromised machinesDisabled affected GitHub workflows.
.png)
n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. This issue has been patched in version 2.0.0. Workarounds for this issue involve disabling the Code Node by setting the environment variable NODES_EXCLUDE: "[\"n8n-nodes-base.code\"]", disabling Python support in the Code node by setting the environment variable N8N_PYTHON_ENABLED=false, which was introduced in n8n version 1.104.0, and configuring n8n to use the task runner based Python sandbox via the N8N_RUNNERS_ENABLED and N8N_NATIVE_PYTHON_RUNNER environment variables.
LMDeploy is a toolkit for compressing, deploying, and serving LLMs. Prior to version 0.11.1, an insecure deserialization vulnerability exists in lmdeploy where torch.load() is called without the weights_only=True parameter when loading model checkpoint files. This allows an attacker to execute arbitrary code on the victim's machine when they load a malicious .bin or .pt model file. This issue has been patched in version 0.11.1.
n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.
Yealink T21P_E2 Phone 52.84.0.15 is vulnerable to Directory Traversal. A remote normal privileged attacker can read arbitrary files via a crafted request result read function of the diagnostic component.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.