Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23889

Опубликовано: 26 янв. 2026
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's tarball extraction allows malicious packages to write files outside the package directory on Windows. The path normalization only checks for ./ but not .\. On Windows, backslashes are directory separators, enabling path traversal. This vulnerability is Windows-only. This issue impacts Windows pnpm users and Windows CI/CD pipelines (GitHub Actions Windows runners, Azure DevOps). It can lead to overwriting .npmrc, build configs, or other files. Version 10.28.1 contains a patch.

A flaw was found in pnpm, a package manager. This vulnerability, known as path traversal, allows a malicious package to write files to unintended locations on Windows systems during the extraction of compressed archives (tarballs). The issue arises because pnpm's path normalization process does not properly account for Windows-specific directory separators. This could enable an attacker to overwrite important configuration files, potentially leading to unauthorized code execution or system compromise.

Отчет

This vulnerability is rated Moderate. However, in the Red Hat context, the impact is limited as this path traversal vulnerability in pnpm's tarball extraction is specific to Windows operating systems. Red Hat products, including the affected Enterprise Application Platform components, primarily operate on Linux environments, where this specific attack vector is not applicable.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2433093pnpm: pnpm: Arbitrary file write via path traversal on Windows

EPSS

Процентиль: 3%
0.00015
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
2 месяца назад

pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's tarball extraction allows malicious packages to write files outside the package directory on Windows. The path normalization only checks for `./` but not `.\`. On Windows, backslashes are directory separators, enabling path traversal. This vulnerability is Windows-only. This issue impacts Windows pnpm users and Windows CI/CD pipelines (GitHub Actions Windows runners, Azure DevOps). It can lead to overwriting `.npmrc`, build configs, or other files. Version 10.28.1 contains a patch.

CVSS3: 6.5
debian
2 месяца назад

pnpm is a package manager. Prior to version 10.28.1, a path traversal ...

CVSS3: 6.5
github
2 месяца назад

pnpm has Windows-specific tarball Path Traversal

CVSS3: 6.5
fstec
2 месяца назад

Уязвимость менеджера пакетов pnpm, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю записывать произвольные файлы

EPSS

Процентиль: 3%
0.00015
Низкий

6.5 Medium

CVSS3