esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.
References
| Link | Resource |
|---|---|
| https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16 | Patch |
| https://github.com/esm-dev/esm.sh/commit/c62ab83c589e7b421a0e1376d2a00a4e48161093 | Patch |
| https://github.com/esm-dev/esm.sh/security/advisories/GHSA-2657-3c98-63jq | Vendor Advisory |
| https://pkg.go.dev/vuln/GO-2025-4138 | Exploit Vendor Advisory |
Configurations
History
18 Feb 2026, 16:10
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:esm:esm.sh:*:*:*:*:*:*:*:* | |
| First Time |
Esm
Esm esm.sh |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16 - Patch | |
| References | () https://github.com/esm-dev/esm.sh/commit/c62ab83c589e7b421a0e1376d2a00a4e48161093 - Patch | |
| References | () https://github.com/esm-dev/esm.sh/security/advisories/GHSA-2657-3c98-63jq - Vendor Advisory | |
| References | () https://pkg.go.dev/vuln/GO-2025-4138 - Exploit, Vendor Advisory |
18 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-18 23:15
Updated : 2026-02-18 16:10
NVD link : CVE-2026-23644
Mitre link : CVE-2026-23644
CVE.ORG link : CVE-2026-23644
JSON object : View
Products Affected
esm
- esm.sh
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
