node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.
CVSS
No CVSS.
References
Configurations
No configuration.
History
11 Mar 2026, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 18:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256 - |
10 Mar 2026, 07:44
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 07:44
Updated : 2026-03-11 13:53
NVD link : CVE-2026-31802
Mitre link : CVE-2026-31802
CVE.ORG link : CVE-2026-31802
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
