CVE-2026-26960: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-26960 affects the isaacs node-tar package, a widely used Node.js library for handling tar archives. In versions 7.5.7 and below, when extracting archives with default options, an attacker can craft a malicious tar archive containing hardlinks that point to files outside the extraction directory. This path traversal flaw (CWE-22) allows the attacker to bypass the intended directory restrictions and perform arbitrary file read and write operations as the user running the extraction process. The root cause is improper limitation of pathnames during extraction, failing to sanitize or restrict hardlink targets. This effectively turns the archive extraction process into a direct filesystem access primitive, which can be leveraged to overwrite critical files or read sensitive data. The vulnerability requires user interaction to extract the malicious archive but does not require prior authentication. The flaw has been addressed in node-tar version 7.5.8 by implementing stricter path validation and hardlink handling. Although no known exploits are reported in the wild, the high impact on confidentiality and integrity combined with ease of exploitation makes this a significant threat for affected systems.
Potential Impact
This vulnerability can lead to unauthorized disclosure and modification of files on systems where vulnerable node-tar versions are used, potentially compromising sensitive data and system integrity. Attackers can overwrite configuration files, inject malicious code, or read sensitive files by exploiting the hardlink path traversal during archive extraction. Since node-tar is commonly used in development, deployment, and CI/CD pipelines, exploitation could affect a wide range of applications and services, leading to supply chain risks and persistent compromise. The impact is especially critical in environments where extraction occurs with elevated privileges or on shared infrastructure. Although availability is not directly affected, the integrity and confidentiality breaches can have severe operational and reputational consequences for organizations worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of node-tar to version 7.5.8 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify and update vulnerable versions. Additionally, implement strict validation and sanitization of archive contents before extraction, especially when archives originate from untrusted sources. Employ the principle of least privilege by running extraction processes with minimal permissions to limit potential damage. Use containerization or sandboxing to isolate extraction environments. Monitor logs and file system changes for suspicious activity related to archive extraction. Incorporate security scanning tools that detect vulnerable dependencies and enforce automated patching in CI/CD pipelines to prevent future exposure.
Affected Countries
United States, Germany, United Kingdom, India, China, Japan, South Korea, France, Canada, Australia
CVE-2026-26960: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
Description
node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-26960 affects the isaacs node-tar package, a widely used Node.js library for handling tar archives. In versions 7.5.7 and below, when extracting archives with default options, an attacker can craft a malicious tar archive containing hardlinks that point to files outside the extraction directory. This path traversal flaw (CWE-22) allows the attacker to bypass the intended directory restrictions and perform arbitrary file read and write operations as the user running the extraction process. The root cause is improper limitation of pathnames during extraction, failing to sanitize or restrict hardlink targets. This effectively turns the archive extraction process into a direct filesystem access primitive, which can be leveraged to overwrite critical files or read sensitive data. The vulnerability requires user interaction to extract the malicious archive but does not require prior authentication. The flaw has been addressed in node-tar version 7.5.8 by implementing stricter path validation and hardlink handling. Although no known exploits are reported in the wild, the high impact on confidentiality and integrity combined with ease of exploitation makes this a significant threat for affected systems.
Potential Impact
This vulnerability can lead to unauthorized disclosure and modification of files on systems where vulnerable node-tar versions are used, potentially compromising sensitive data and system integrity. Attackers can overwrite configuration files, inject malicious code, or read sensitive files by exploiting the hardlink path traversal during archive extraction. Since node-tar is commonly used in development, deployment, and CI/CD pipelines, exploitation could affect a wide range of applications and services, leading to supply chain risks and persistent compromise. The impact is especially critical in environments where extraction occurs with elevated privileges or on shared infrastructure. Although availability is not directly affected, the integrity and confidentiality breaches can have severe operational and reputational consequences for organizations worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of node-tar to version 7.5.8 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify and update vulnerable versions. Additionally, implement strict validation and sanitization of archive contents before extraction, especially when archives originate from untrusted sources. Employ the principle of least privilege by running extraction processes with minimal permissions to limit potential damage. Use containerization or sandboxing to isolate extraction environments. Monitor logs and file system changes for suspicious activity related to archive extraction. Incorporate security scanning tools that detect vulnerable dependencies and enforce automated patching in CI/CD pipelines to prevent future exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6997b995d7880ec89b49375c
Added to database: 2/20/2026, 1:32:05 AM
Last enriched: 2/28/2026, 2:49:06 PM
Last updated: 4/5/2026, 10:10:45 PM
Views: 274
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.