Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-24131

Опубликовано: 26 янв. 2026
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

pnpm is a package manager. Prior to version 10.28.2, when pnpm processes a package's directories.bin field, it uses path.join() without validating the result stays within the package root. A malicious npm package can specify "directories": {"bin": "../../../../tmp"} to escape the package directory, causing pnpm to chmod 755 files at arbitrary locations. This issue only affects Unix/Linux/macOS. Windows is not affected (fixBin gated by EXECUTABLE_SHEBANG_SUPPORTED). Version 10.28.2 contains a patch.

A flaw was found in pnpm, a package manager. When pnpm processes the directories.bin field of a package, it fails to properly validate the path, allowing a malicious npm package to specify a crafted path. This directory traversal vulnerability enables the package to escape its intended directory and modify file permissions (chmod 755) at arbitrary locations on the system. This issue primarily affects Unix, Linux, and macOS operating systems.

Отчет

This vulnerability is rated Moderate for Red Hat products as it allows a malicious npm package to perform path traversal, leading to arbitrary file permission modification (chmod 755) outside the intended package directory. This issue affects systems running pnpm on Unix/Linux-based Red Hat environments when processing untrusted npm packages.

Меры по смягчению последствий

To mitigate this issue, ensure that only trusted npm packages are used with pnpm. Avoid installing packages from untrusted or unverified sources to prevent the processing of malicious package directories.bin fields.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2433115pnpm: pnpm: Arbitrary file permission modification via directory traversal

EPSS

Процентиль: 0%
0.00006
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
2 месяца назад

pnpm is a package manager. Prior to version 10.28.2, when pnpm processes a package's `directories.bin` field, it uses `path.join()` without validating the result stays within the package root. A malicious npm package can specify `"directories": {"bin": "../../../../tmp"}` to escape the package directory, causing pnpm to chmod 755 files at arbitrary locations. This issue only affects Unix/Linux/macOS. Windows is not affected (`fixBin` gated by `EXECUTABLE_SHEBANG_SUPPORTED`). Version 10.28.2 contains a patch.

CVSS3: 5.5
debian
2 месяца назад

pnpm is a package manager. Prior to version 10.28.2, when pnpm process ...

github
2 месяца назад

pnpm has Path Traversal via arbitrary file permission modification

CVSS3: 5.5
fstec
2 месяца назад

Уязвимость функции path.join() менеджера пакетов pnpm, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и повысить свои привилегии

EPSS

Процентиль: 0%
0.00006
Низкий

6.5 Medium

CVSS3