Skip to main content

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in org.webjars.npm:tar

CVE-2026-26960

  • org.webjars.npm:tar
  • org.webjars:tar
  • tar
Severity High
Score 7.1/10

Summary

"tar.extract()" in Node tar allows an attacker-controlled archive to create a hardlink inside the extraction directory that points to a file outside the extraction root, using default options. This enables arbitrary file read and write as the extracting user (no root, no "chmod", no "preservePaths"). Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue affects versions prior to version 7.5.8.

  • LOW
  • LOCAL
  • HIGH
  • UNCHANGED
  • REQUIRED
  • NONE
  • HIGH
  • NONE

CWE-22 - Path Traversal

Path traversal (or directory traversal), is a vulnerability that allows malicious users to traverse the server's root directory, gaining access to arbitrary files and folders such as application code & data, back-end credentials, and sensitive operating system files. In the worst-case scenario, an attacker could potentially execute arbitrary files on the server, resulting in a denial of service attack. Such an exploit may severely impact the integrity, confidentiality, and availability of an application.

References

Advisory Timeline

  • Published