node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
References
Configurations
History
20 Feb 2026, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Isaacs tar
Isaacs |
|
| CPE | cpe:2.3:a:isaacs:tar:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384 - Patch | |
| References | () https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f - Patch | |
| References | () https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx - Exploit, Vendor Advisory |
20 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 02:16
Updated : 2026-02-20 19:24
NVD link : CVE-2026-26960
Mitre link : CVE-2026-26960
CVE.ORG link : CVE-2026-26960
JSON object : View
Products Affected
isaacs
- tar
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
