pnpm is a package manager. Prior to version 10.28.2, when pnpm processes a package's `directories.bin` field, it uses `path.join()` without validating the result stays within the package root. A malicious npm package can specify `"directories": {"bin": "../../../../tmp"}` to escape the package directory, causing pnpm to chmod 755 files at arbitrary locations. This issue only affects Unix/Linux/macOS. Windows is not affected (`fixBin` gated by `EXECUTABLE_SHEBANG_SUPPORTED`). Version 10.28.2 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/pnpm/pnpm/commit/17432ad5bbed5c2e77255ca6d56a1449bbcfd943 | Patch |
| https://github.com/pnpm/pnpm/releases/tag/v10.28.2 | Release Notes |
| https://github.com/pnpm/pnpm/security/advisories/GHSA-v253-rj99-jwpq | Exploit Vendor Advisory |
Configurations
History
28 Jan 2026, 17:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pnpm:pnpm:*:*:*:*:*:node.js:*:* | |
| First Time |
Pnpm pnpm
Pnpm |
|
| References | () https://github.com/pnpm/pnpm/commit/17432ad5bbed5c2e77255ca6d56a1449bbcfd943 - Patch | |
| References | () https://github.com/pnpm/pnpm/releases/tag/v10.28.2 - Release Notes | |
| References | () https://github.com/pnpm/pnpm/security/advisories/GHSA-v253-rj99-jwpq - Exploit, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
26 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-26 22:15
Updated : 2026-01-28 17:05
NVD link : CVE-2026-24131
Mitre link : CVE-2026-24131
CVE.ORG link : CVE-2026-24131
JSON object : View
Products Affected
pnpm
- pnpm
