CVE-2026-23950: CWE-176: Improper Handling of Unicode Encoding in isaacs node-tar
CVE-2026-23950 is a high-severity race condition vulnerability in the node-tar library (versions prior to 7. 5. 4) used in Node. js environments. It arises from improper handling of Unicode path collisions on case-insensitive or normalization-insensitive filesystems like macOS APFS. The vulnerability allows attackers to bypass internal concurrency controls by exploiting filename collisions (e. g. , between 'ß' and 'ss'), enabling symlink poisoning and arbitrary file overwrite via crafted tar archives. Exploitation requires no privileges but does require user interaction to extract a malicious tarball. The issue is fixed in node-tar 7.
AI Analysis
Technical Summary
CVE-2026-23950 affects the node-tar library, a widely used tar extraction utility in Node.js environments, up to version 7.5.3. The vulnerability stems from a race condition caused by improper handling of Unicode path collisions within the library's internal path reservation system. Node-tar uses a PathReservations mechanism to serialize file operations on the same path to prevent race conditions. However, on filesystems like macOS APFS or HFS+, which are case-insensitive and normalization-insensitive, Unicode characters that visually or semantically collide (such as the German sharp S 'ß' and the letter sequence 'ss') are treated as identical paths by the filesystem but differently by node-tar’s normalization logic (which used NFD normalization). This discrepancy allows two conflicting paths to be processed in parallel, bypassing the serialization safeguards. An attacker can craft a malicious tar archive containing symbolic links with colliding Unicode names, triggering a race condition that leads to symlink poisoning and arbitrary file overwrite on the victim system. This can compromise the integrity of the filesystem and potentially lead to code execution or privilege escalation if critical files are overwritten. The vulnerability does not require privileges to exploit but does require user interaction to extract the malicious archive. The patch released in node-tar 7.5.4 addresses this by changing the normalization approach to NFKD, followed by locale-aware lowercasing and uppercasing to align with the filesystem’s behavior, ensuring path collisions are properly detected and serialized. As a temporary mitigation, users unable to upgrade immediately should filter out symbolic link entries during extraction to prevent exploitation. No known exploits are currently reported in the wild, but the high CVSS score (8.8) indicates a serious threat. This vulnerability is particularly relevant for environments running macOS systems that use node-tar to process tarballs, especially in automated or CI/CD pipelines where untrusted archives may be handled.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of systems running Node.js applications that utilize node-tar on macOS platforms. Organizations involved in software development, continuous integration, package management, or any automated processing of tar archives could be targeted. Successful exploitation can lead to arbitrary file overwrites, enabling attackers to inject malicious files or replace critical system or application files, potentially resulting in code execution or system compromise. This can disrupt business operations, cause data breaches, and lead to compliance violations under regulations like GDPR if sensitive data is affected. The attack vector requires user interaction (extracting a malicious tarball), which may be feasible in scenarios where users download or receive tar files from untrusted sources or where automated systems process such files without adequate validation. The vulnerability’s reliance on macOS APFS or HFS+ filesystems limits its impact to organizations using these platforms, but given the popularity of macOS in European tech sectors, especially in software development and creative industries, the threat is non-negligible. Additionally, the ability to bypass concurrency controls raises concerns about the robustness of supply chain security and artifact handling in affected environments.
Mitigation Recommendations
1. Upgrade node-tar to version 7.5.4 or later immediately to apply the official patch that corrects Unicode normalization and path reservation handling. 2. For environments where immediate upgrade is not possible, implement filtering to exclude symbolic link entries during tar extraction, as symbolic links are the primary vector for exploitation. 3. Restrict processing of tar archives to trusted sources only and implement strict validation and scanning of tarball contents before extraction. 4. Employ runtime monitoring and file integrity checking on macOS systems to detect unexpected file modifications or symlink creations. 5. In CI/CD pipelines or automated systems, isolate tar extraction processes in sandboxed or containerized environments to limit potential damage from exploitation. 6. Educate developers and system administrators about the risks of processing untrusted archives and the importance of timely patching. 7. Review and update security policies to include checks for Unicode normalization issues and race conditions in file handling components. 8. Consider using alternative extraction tools or libraries that do not exhibit this vulnerability if immediate patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2026-23950: CWE-176: Improper Handling of Unicode Encoding in isaacs node-tar
Description
CVE-2026-23950 is a high-severity race condition vulnerability in the node-tar library (versions prior to 7. 5. 4) used in Node. js environments. It arises from improper handling of Unicode path collisions on case-insensitive or normalization-insensitive filesystems like macOS APFS. The vulnerability allows attackers to bypass internal concurrency controls by exploiting filename collisions (e. g. , between 'ß' and 'ss'), enabling symlink poisoning and arbitrary file overwrite via crafted tar archives. Exploitation requires no privileges but does require user interaction to extract a malicious tarball. The issue is fixed in node-tar 7.
AI-Powered Analysis
Technical Analysis
CVE-2026-23950 affects the node-tar library, a widely used tar extraction utility in Node.js environments, up to version 7.5.3. The vulnerability stems from a race condition caused by improper handling of Unicode path collisions within the library's internal path reservation system. Node-tar uses a PathReservations mechanism to serialize file operations on the same path to prevent race conditions. However, on filesystems like macOS APFS or HFS+, which are case-insensitive and normalization-insensitive, Unicode characters that visually or semantically collide (such as the German sharp S 'ß' and the letter sequence 'ss') are treated as identical paths by the filesystem but differently by node-tar’s normalization logic (which used NFD normalization). This discrepancy allows two conflicting paths to be processed in parallel, bypassing the serialization safeguards. An attacker can craft a malicious tar archive containing symbolic links with colliding Unicode names, triggering a race condition that leads to symlink poisoning and arbitrary file overwrite on the victim system. This can compromise the integrity of the filesystem and potentially lead to code execution or privilege escalation if critical files are overwritten. The vulnerability does not require privileges to exploit but does require user interaction to extract the malicious archive. The patch released in node-tar 7.5.4 addresses this by changing the normalization approach to NFKD, followed by locale-aware lowercasing and uppercasing to align with the filesystem’s behavior, ensuring path collisions are properly detected and serialized. As a temporary mitigation, users unable to upgrade immediately should filter out symbolic link entries during extraction to prevent exploitation. No known exploits are currently reported in the wild, but the high CVSS score (8.8) indicates a serious threat. This vulnerability is particularly relevant for environments running macOS systems that use node-tar to process tarballs, especially in automated or CI/CD pipelines where untrusted archives may be handled.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of systems running Node.js applications that utilize node-tar on macOS platforms. Organizations involved in software development, continuous integration, package management, or any automated processing of tar archives could be targeted. Successful exploitation can lead to arbitrary file overwrites, enabling attackers to inject malicious files or replace critical system or application files, potentially resulting in code execution or system compromise. This can disrupt business operations, cause data breaches, and lead to compliance violations under regulations like GDPR if sensitive data is affected. The attack vector requires user interaction (extracting a malicious tarball), which may be feasible in scenarios where users download or receive tar files from untrusted sources or where automated systems process such files without adequate validation. The vulnerability’s reliance on macOS APFS or HFS+ filesystems limits its impact to organizations using these platforms, but given the popularity of macOS in European tech sectors, especially in software development and creative industries, the threat is non-negligible. Additionally, the ability to bypass concurrency controls raises concerns about the robustness of supply chain security and artifact handling in affected environments.
Mitigation Recommendations
1. Upgrade node-tar to version 7.5.4 or later immediately to apply the official patch that corrects Unicode normalization and path reservation handling. 2. For environments where immediate upgrade is not possible, implement filtering to exclude symbolic link entries during tar extraction, as symbolic links are the primary vector for exploitation. 3. Restrict processing of tar archives to trusted sources only and implement strict validation and scanning of tarball contents before extraction. 4. Employ runtime monitoring and file integrity checking on macOS systems to detect unexpected file modifications or symlink creations. 5. In CI/CD pipelines or automated systems, isolate tar extraction processes in sandboxed or containerized environments to limit potential damage from exploitation. 6. Educate developers and system administrators about the risks of processing untrusted archives and the importance of timely patching. 7. Review and update security policies to include checks for Unicode normalization issues and race conditions in file handling components. 8. Consider using alternative extraction tools or libraries that do not exhibit this vulnerability if immediate patching is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T14:49:06.312Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696ed8794623b1157ce40bb5
Added to database: 1/20/2026, 1:20:57 AM
Last enriched: 1/20/2026, 1:35:21 AM
Last updated: 1/20/2026, 2:38:01 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1051: CWE-352 Cross-Site Request Forgery (CSRF) in satollo Newsletter – Send awesome emails from WordPress
MediumCVE-2025-14978: CWE-862 Missing Authorization in peachpay PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net)
MediumCVE-2026-1203: Improper Authentication in CRMEB
MediumCVE-2026-1202: Improper Authentication in CRMEB
MediumCVE-2026-23949: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaraco jaraco.context
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.