CVE-2026-26960Path Traversal in Node-tar

CWE-22Path Traversal10 documents9 sources
Severity
7.1HIGHNVD
EPSS
0.0%
top 99.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 20

Description

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.8 | Impact: 5.2

Affected Packages4 packages

CVEListV5isaacs/node-tar< 7.5.8
Debianisaacs/node-tar< 6.2.1+ds1+~cs6.1.13-8
npmgnu/tar< 7.5.8
NVDisaacs/tar< 7.5.8

Patches

🔴Vulnerability Details

4
CVEList
node-tar has Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in Extraction2026-02-20
OSV
CVE-2026-26960: node-tar is a full-featured Tar for Node2026-02-20
OSV
Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction2026-02-18
GHSA
Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction2026-02-18

📋Vendor Advisories

3
Red Hat
node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation2026-02-20
Microsoft
node-tar has Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in Extraction2026-02-10
Debian
CVE-2026-26960: node-tar - node-tar is a full-featured Tar for Node.js. When using default options in versi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-26960 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-26960 node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation2026-02-20
CVE-2026-26960 — Path Traversal in Isaacs Node-tar | cvebase