Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23890

Опубликовано: 26 янв. 2026
Источник: redhat
CVSS3: 6.5

Описание

pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's bin linking allows malicious npm packages to create executable shims or symlinks outside of node_modules/.bin. Bin names starting with @ bypass validation, and after scope normalization, path traversal sequences like ../../ remain intact. This issue affects all pnpm users who install npm packages and CI/CD pipelines using pnpm. It can lead to overwriting config files, scripts, or other sensitive files. Version 10.28.1 contains a patch.

A flaw was found in pnpm, a package manager. A remote attacker can exploit a path traversal vulnerability by crafting malicious npm packages. This vulnerability allows the attacker to bypass validation by using bin names starting with an "@" symbol, enabling them to create executable shims or symbolic links (symlinks) outside of the designated node_modules/.bin directory. This could lead to arbitrary code execution or privilege escalation on the affected system.

Отчет

This vulnerability is rated Moderate for Red Hat. It affects systems using pnpm where malicious npm packages can exploit a path traversal flaw during bin linking. This allows the creation of executable files or symlinks outside of the node_modules/.bin directory, posing a risk in environments that install untrusted npm packages, such as development or CI/CD pipelines.

Меры по смягчению последствий

To mitigate this issue, ensure that only trusted npm packages are installed when utilizing pnpm. Restrict the use of pnpm for package installation to controlled environments, such as secure CI/CD pipelines, to prevent the introduction of malicious packages. Implement robust package source validation and integrity checks to minimize exposure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-23
https://bugzilla.redhat.com/show_bug.cgi?id=2433090pnpm: pnpm: Arbitrary code execution via path traversal in bin linking

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
2 месяца назад

pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's bin linking allows malicious npm packages to create executable shims or symlinks outside of `node_modules/.bin`. Bin names starting with `@` bypass validation, and after scope normalization, path traversal sequences like `../../` remain intact. This issue affects all pnpm users who install npm packages and CI/CD pipelines using pnpm. It can lead to overwriting config files, scripts, or other sensitive files. Version 10.28.1 contains a patch.

CVSS3: 6.5
debian
2 месяца назад

pnpm is a package manager. Prior to version 10.28.1, a path traversal ...

CVSS3: 6.5
github
2 месяца назад

pnpm scoped bin name Path Traversal allows arbitrary file creation outside node_modules/.bin

CVSS3: 6.5
fstec
2 месяца назад

Уязвимость менеджера пакетов pnpm, связанная с неверным ограничением имени пути к каталогу, позволяющая нарушителю записывать произвольные файлы

6.5 Medium

CVSS3