Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh

0
High
VulnerabilityCVE-2026-23644cvecve-2026-23644cwe-22
Published: Sun Jan 18 2026 (01/18/2026, 22:49:29 UTC)
Source: CVE Database V5
Vendor/Project: esm-dev
Product: esm.sh

Description

esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:56:46 UTC

Technical Analysis

The vulnerability CVE-2026-23644 affects esm.sh, a content delivery network widely used in web development to serve JavaScript modules without build steps. The root cause is an incomplete fix for path traversal (CWE-22) due to reliance on Go's path.Clean function, which normalizes paths but does not prevent absolute paths embedded within malicious tar files. Attackers can craft tar archives containing absolute or relative paths that escape the intended extraction directory, enabling them to overwrite or create files arbitrarily on the server hosting esm.sh. This can lead to unauthorized file writes, potentially allowing code injection, server compromise, or disruption of service. The vulnerability is present in esm.sh versions before 0.0.0-20260116051925-c62ab83c589e, with the fix committed in the referenced GitHub commit. The CVSS 4.0 vector indicates the vulnerability is remotely exploitable without authentication or user interaction, with high impact on confidentiality due to possible unauthorized file access or modification. No known exploits have been reported in the wild, but the nature of the flaw and the public availability of the fix suggest attackers could develop exploits. The vulnerability affects the core functionality of esm.sh in handling tar files, which is critical for its operation as a CDN serving web modules.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on esm.sh for web development or as part of their software supply chain. Exploitation could allow attackers to write arbitrary files on servers hosting esm.sh or integrated systems, potentially leading to remote code execution, data breaches, or service disruption. This risk extends to organizations using esm.sh transitively through dependencies in their development environments or CI/CD pipelines. Given esm.sh's role in modern web development, compromised servers could serve malicious code to end users, affecting confidentiality and integrity of delivered content. The vulnerability could also be leveraged to implant persistent backdoors or disrupt critical web services. European entities in sectors such as finance, technology, and government, which depend heavily on secure web infrastructure, may face increased risk. Additionally, supply chain attacks exploiting this vulnerability could have cascading effects across multiple organizations.

Mitigation Recommendations

European organizations should immediately upgrade esm.sh to version 0.0.0-20260116051925-c62ab83c589e or later, which contains the fix for this path traversal vulnerability. Beyond upgrading, organizations should audit all tar file handling processes to ensure that path validation does not solely rely on path.Clean but includes checks to reject absolute paths and path traversal sequences (e.g., '../'). Implement sandboxing or containerization for esm.sh services to limit filesystem access in case of exploitation. Employ file integrity monitoring on directories used by esm.sh to detect unauthorized file modifications. Incorporate security scanning in CI/CD pipelines to detect vulnerable esm.sh versions and malicious tar files. Network-level protections such as web application firewalls (WAFs) can be tuned to detect suspicious requests related to tar file uploads or esm.sh interactions. Finally, monitor logs and alerts for unusual file system activity or errors indicating exploitation attempts. Coordinated vulnerability disclosure and information sharing within European cybersecurity communities can aid in early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-14T16:08:37.484Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696d652dd302b072d904091e

Added to database: 1/18/2026, 10:56:45 PM

Last enriched: 1/26/2026, 7:56:46 PM

Last updated: 2/7/2026, 5:08:32 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats