Isaacs Node-Tar vulnerabilities
14 known vulnerabilities affecting isaacs/node-tar.
Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH11MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2026-31802HIGHCVSS 8.2fixed in 7.5.112026-03-10
CVE-2026-31802 [HIGH] CWE-22 CVE-2026-31802: node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into
node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.
cvelistv5nvdosv
CVE-2026-29786HIGHCVSS 8.2fixed in 7.5.102026-03-07
CVE-2026-29786 [HIGH] CWE-22 CVE-2026-29786: node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creati
node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
cvelistv5nvdosv
CVE-2026-26960HIGHCVSS 7.1fixed in 7.5.82026-02-20
CVE-2026-26960 [HIGH] CWE-22 CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below,
node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path p
cvelistv5nvdosv
CVE-2026-24842HIGHCVSS 8.2fixed in 7.5.72026-01-28
CVE-2026-24842 [HIGH] CWE-22 CVE-2026-24842: node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security c
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary file
cvelistv5nvdosv
CVE-2026-23950MEDIUMCVSS 5.9fixed in 7.5.42026-01-20
CVE-2026-23950 [MEDIUM] CWE-176 CVE-2026-23950: node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3
node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding p
cvelistv5nvdosv
CVE-2026-23745HIGHCVSS 8.2fixed in 7.5.32026-01-16
CVE-2026-23745 [HIGH] CWE-22 CVE-2026-23745: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Lin
node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolut
cvelistv5nvdosv
CVE-2025-64118MEDIUMCVSS 6.1v= 7.5.12025-10-30
CVE-2025-64118 [MEDIUM] CWE-362 CVE-2025-64118: node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry
node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.
cvelistv5nvd
CVE-2024-28863MEDIUMCVSS 6.5fixed in 6.2.12024-03-21
CVE-2024-28863 [MEDIUM] CWE-400 CVE-2024-28863: node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-fol
node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-fo
cvelistv5ghsanvdosv
CVE-2021-37712HIGHCVSS 8.6≥ 0, < 6.0.5+ds1+~cs11.3.9-1+deb11u2≥ 0, < 6.1.11+~cs11.3.10-12021-08-31
CVE-2021-37712 [HIGH] CVE-2021-37712: The npm package "tar" (aka node-tar) before versions 4
The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary st
osv
CVE-2021-37701HIGHCVSS 8.6≥ 0, < 6.0.5+ds1+~cs11.3.9-1+deb11u2≥ 0, < 6.1.7+~cs11.3.10-12021-08-31
CVE-2021-37701 [HIGH] CVE-2021-37701: The npm package "tar" (aka node-tar) before versions 4
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary sta
osv
CVE-2021-32804HIGHCVSS 8.1≥ 0, < 6.0.5+ds1+~cs11.3.9-1+deb11u1≥ 0, < 6.1.7+~cs11.3.10-12021-08-03
CVE-2021-32804 [HIGH] CVE-2021-32804: The npm package "tar" (aka node-tar) before versions 6
The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any a
osv
CVE-2021-32803HIGHCVSS 8.1≥ 0, < 6.0.5+ds1+~cs11.3.9-1+deb11u1≥ 0, < 6.1.7+~cs11.3.10-12021-08-03
CVE-2021-32803 [HIGH] CVE-2021-32803: The npm package "tar" (aka node-tar) before versions 6
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent
osv
CVE-2018-20834HIGHCVSS 7.5≥ 0, < 4.4.4+ds1-22019-04-30
CVE-2018-20834 [HIGH] CVE-2018-20834: A vulnerability was found in node-tar before version 4
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
osv
CVE-2015-8860HIGHCVSS 7.5≥ 0, < 2.2.1-12017-01-23
CVE-2015-8860 [HIGH] CVE-2015-8860: The tar package before 2
The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive.
osv