Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23950: CWE-176: Improper Handling of Unicode Encoding in isaacs node-tar

0
High
VulnerabilityCVE-2026-23950cvecve-2026-23950cwe-176cwe-352cwe-367
Published: Tue Jan 20 2026 (01/20/2026, 00:40:48 UTC)
Source: CVE Database V5
Vendor/Project: isaacs
Product: node-tar

Description

CVE-2026-23950 is a high-severity race condition vulnerability in the node-tar library (versions prior to 7. 5. 4) used in Node. js environments. It arises from improper handling of Unicode path collisions on case-insensitive or normalization-insensitive filesystems like macOS APFS. The vulnerability allows attackers to bypass internal concurrency controls by exploiting filename collisions (e. g. , between 'ß' and 'ss'), enabling symlink poisoning and arbitrary file overwrite via crafted tar archives. Exploitation requires no privileges but does require user interaction to extract a malicious tarball. The issue is fixed in node-tar 7.

AI-Powered Analysis

AILast updated: 01/20/2026, 01:35:21 UTC

Technical Analysis

CVE-2026-23950 affects the node-tar library, a widely used tar extraction utility in Node.js environments, up to version 7.5.3. The vulnerability stems from a race condition caused by improper handling of Unicode path collisions within the library's internal path reservation system. Node-tar uses a PathReservations mechanism to serialize file operations on the same path to prevent race conditions. However, on filesystems like macOS APFS or HFS+, which are case-insensitive and normalization-insensitive, Unicode characters that visually or semantically collide (such as the German sharp S 'ß' and the letter sequence 'ss') are treated as identical paths by the filesystem but differently by node-tar’s normalization logic (which used NFD normalization). This discrepancy allows two conflicting paths to be processed in parallel, bypassing the serialization safeguards. An attacker can craft a malicious tar archive containing symbolic links with colliding Unicode names, triggering a race condition that leads to symlink poisoning and arbitrary file overwrite on the victim system. This can compromise the integrity of the filesystem and potentially lead to code execution or privilege escalation if critical files are overwritten. The vulnerability does not require privileges to exploit but does require user interaction to extract the malicious archive. The patch released in node-tar 7.5.4 addresses this by changing the normalization approach to NFKD, followed by locale-aware lowercasing and uppercasing to align with the filesystem’s behavior, ensuring path collisions are properly detected and serialized. As a temporary mitigation, users unable to upgrade immediately should filter out symbolic link entries during extraction to prevent exploitation. No known exploits are currently reported in the wild, but the high CVSS score (8.8) indicates a serious threat. This vulnerability is particularly relevant for environments running macOS systems that use node-tar to process tarballs, especially in automated or CI/CD pipelines where untrusted archives may be handled.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of systems running Node.js applications that utilize node-tar on macOS platforms. Organizations involved in software development, continuous integration, package management, or any automated processing of tar archives could be targeted. Successful exploitation can lead to arbitrary file overwrites, enabling attackers to inject malicious files or replace critical system or application files, potentially resulting in code execution or system compromise. This can disrupt business operations, cause data breaches, and lead to compliance violations under regulations like GDPR if sensitive data is affected. The attack vector requires user interaction (extracting a malicious tarball), which may be feasible in scenarios where users download or receive tar files from untrusted sources or where automated systems process such files without adequate validation. The vulnerability’s reliance on macOS APFS or HFS+ filesystems limits its impact to organizations using these platforms, but given the popularity of macOS in European tech sectors, especially in software development and creative industries, the threat is non-negligible. Additionally, the ability to bypass concurrency controls raises concerns about the robustness of supply chain security and artifact handling in affected environments.

Mitigation Recommendations

1. Upgrade node-tar to version 7.5.4 or later immediately to apply the official patch that corrects Unicode normalization and path reservation handling. 2. For environments where immediate upgrade is not possible, implement filtering to exclude symbolic link entries during tar extraction, as symbolic links are the primary vector for exploitation. 3. Restrict processing of tar archives to trusted sources only and implement strict validation and scanning of tarball contents before extraction. 4. Employ runtime monitoring and file integrity checking on macOS systems to detect unexpected file modifications or symlink creations. 5. In CI/CD pipelines or automated systems, isolate tar extraction processes in sandboxed or containerized environments to limit potential damage from exploitation. 6. Educate developers and system administrators about the risks of processing untrusted archives and the importance of timely patching. 7. Review and update security policies to include checks for Unicode normalization issues and race conditions in file handling components. 8. Consider using alternative extraction tools or libraries that do not exhibit this vulnerability if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T14:49:06.312Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ed8794623b1157ce40bb5

Added to database: 1/20/2026, 1:20:57 AM

Last enriched: 1/20/2026, 1:35:21 AM

Last updated: 1/20/2026, 2:38:01 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats