CVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.
AI Analysis
Technical Summary
The vulnerability CVE-2026-23644 affects esm.sh, a content delivery network widely used in web development to serve JavaScript modules without build steps. The root cause is an incomplete fix for path traversal (CWE-22) due to reliance on Go's path.Clean function, which normalizes paths but does not prevent absolute paths embedded within malicious tar files. Attackers can craft tar archives containing absolute or relative paths that escape the intended extraction directory, enabling them to overwrite or create files arbitrarily on the server hosting esm.sh. This can lead to unauthorized file writes, potentially allowing code injection, server compromise, or disruption of service. The vulnerability is present in esm.sh versions before 0.0.0-20260116051925-c62ab83c589e, with the fix committed in the referenced GitHub commit. The CVSS 4.0 vector indicates the vulnerability is remotely exploitable without authentication or user interaction, with high impact on confidentiality due to possible unauthorized file access or modification. No known exploits have been reported in the wild, but the nature of the flaw and the public availability of the fix suggest attackers could develop exploits. The vulnerability affects the core functionality of esm.sh in handling tar files, which is critical for its operation as a CDN serving web modules.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on esm.sh for web development or as part of their software supply chain. Exploitation could allow attackers to write arbitrary files on servers hosting esm.sh or integrated systems, potentially leading to remote code execution, data breaches, or service disruption. This risk extends to organizations using esm.sh transitively through dependencies in their development environments or CI/CD pipelines. Given esm.sh's role in modern web development, compromised servers could serve malicious code to end users, affecting confidentiality and integrity of delivered content. The vulnerability could also be leveraged to implant persistent backdoors or disrupt critical web services. European entities in sectors such as finance, technology, and government, which depend heavily on secure web infrastructure, may face increased risk. Additionally, supply chain attacks exploiting this vulnerability could have cascading effects across multiple organizations.
Mitigation Recommendations
European organizations should immediately upgrade esm.sh to version 0.0.0-20260116051925-c62ab83c589e or later, which contains the fix for this path traversal vulnerability. Beyond upgrading, organizations should audit all tar file handling processes to ensure that path validation does not solely rely on path.Clean but includes checks to reject absolute paths and path traversal sequences (e.g., '../'). Implement sandboxing or containerization for esm.sh services to limit filesystem access in case of exploitation. Employ file integrity monitoring on directories used by esm.sh to detect unauthorized file modifications. Incorporate security scanning in CI/CD pipelines to detect vulnerable esm.sh versions and malicious tar files. Network-level protections such as web application firewalls (WAFs) can be tuned to detect suspicious requests related to tar file uploads or esm.sh interactions. Finally, monitor logs and alerts for unusual file system activity or errors indicating exploitation attempts. Coordinated vulnerability disclosure and information sharing within European cybersecurity communities can aid in early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
Description
esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-23644 affects esm.sh, a content delivery network widely used in web development to serve JavaScript modules without build steps. The root cause is an incomplete fix for path traversal (CWE-22) due to reliance on Go's path.Clean function, which normalizes paths but does not prevent absolute paths embedded within malicious tar files. Attackers can craft tar archives containing absolute or relative paths that escape the intended extraction directory, enabling them to overwrite or create files arbitrarily on the server hosting esm.sh. This can lead to unauthorized file writes, potentially allowing code injection, server compromise, or disruption of service. The vulnerability is present in esm.sh versions before 0.0.0-20260116051925-c62ab83c589e, with the fix committed in the referenced GitHub commit. The CVSS 4.0 vector indicates the vulnerability is remotely exploitable without authentication or user interaction, with high impact on confidentiality due to possible unauthorized file access or modification. No known exploits have been reported in the wild, but the nature of the flaw and the public availability of the fix suggest attackers could develop exploits. The vulnerability affects the core functionality of esm.sh in handling tar files, which is critical for its operation as a CDN serving web modules.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on esm.sh for web development or as part of their software supply chain. Exploitation could allow attackers to write arbitrary files on servers hosting esm.sh or integrated systems, potentially leading to remote code execution, data breaches, or service disruption. This risk extends to organizations using esm.sh transitively through dependencies in their development environments or CI/CD pipelines. Given esm.sh's role in modern web development, compromised servers could serve malicious code to end users, affecting confidentiality and integrity of delivered content. The vulnerability could also be leveraged to implant persistent backdoors or disrupt critical web services. European entities in sectors such as finance, technology, and government, which depend heavily on secure web infrastructure, may face increased risk. Additionally, supply chain attacks exploiting this vulnerability could have cascading effects across multiple organizations.
Mitigation Recommendations
European organizations should immediately upgrade esm.sh to version 0.0.0-20260116051925-c62ab83c589e or later, which contains the fix for this path traversal vulnerability. Beyond upgrading, organizations should audit all tar file handling processes to ensure that path validation does not solely rely on path.Clean but includes checks to reject absolute paths and path traversal sequences (e.g., '../'). Implement sandboxing or containerization for esm.sh services to limit filesystem access in case of exploitation. Employ file integrity monitoring on directories used by esm.sh to detect unauthorized file modifications. Incorporate security scanning in CI/CD pipelines to detect vulnerable esm.sh versions and malicious tar files. Network-level protections such as web application firewalls (WAFs) can be tuned to detect suspicious requests related to tar file uploads or esm.sh interactions. Finally, monitor logs and alerts for unusual file system activity or errors indicating exploitation attempts. Coordinated vulnerability disclosure and information sharing within European cybersecurity communities can aid in early detection of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-14T16:08:37.484Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696d652dd302b072d904091e
Added to database: 1/18/2026, 10:56:45 PM
Last enriched: 1/26/2026, 7:56:46 PM
Last updated: 2/7/2026, 7:41:49 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.