Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26960: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar

0
High
VulnerabilityCVE-2026-26960cvecve-2026-26960cwe-22
Published: Fri Feb 20 2026 (02/20/2026, 01:07:52 UTC)
Source: CVE Database V5
Vendor/Project: isaacs
Product: node-tar

Description

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:49:06 UTC

Technical Analysis

The vulnerability identified as CVE-2026-26960 affects the isaacs node-tar package, a widely used Node.js library for handling tar archives. In versions 7.5.7 and below, when extracting archives with default options, an attacker can craft a malicious tar archive containing hardlinks that point to files outside the extraction directory. This path traversal flaw (CWE-22) allows the attacker to bypass the intended directory restrictions and perform arbitrary file read and write operations as the user running the extraction process. The root cause is improper limitation of pathnames during extraction, failing to sanitize or restrict hardlink targets. This effectively turns the archive extraction process into a direct filesystem access primitive, which can be leveraged to overwrite critical files or read sensitive data. The vulnerability requires user interaction to extract the malicious archive but does not require prior authentication. The flaw has been addressed in node-tar version 7.5.8 by implementing stricter path validation and hardlink handling. Although no known exploits are reported in the wild, the high impact on confidentiality and integrity combined with ease of exploitation makes this a significant threat for affected systems.

Potential Impact

This vulnerability can lead to unauthorized disclosure and modification of files on systems where vulnerable node-tar versions are used, potentially compromising sensitive data and system integrity. Attackers can overwrite configuration files, inject malicious code, or read sensitive files by exploiting the hardlink path traversal during archive extraction. Since node-tar is commonly used in development, deployment, and CI/CD pipelines, exploitation could affect a wide range of applications and services, leading to supply chain risks and persistent compromise. The impact is especially critical in environments where extraction occurs with elevated privileges or on shared infrastructure. Although availability is not directly affected, the integrity and confidentiality breaches can have severe operational and reputational consequences for organizations worldwide.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of node-tar to version 7.5.8 or later, where the vulnerability is fixed. Organizations should audit their codebases and dependencies to identify and update vulnerable versions. Additionally, implement strict validation and sanitization of archive contents before extraction, especially when archives originate from untrusted sources. Employ the principle of least privilege by running extraction processes with minimal permissions to limit potential damage. Use containerization or sandboxing to isolate extraction environments. Monitor logs and file system changes for suspicious activity related to archive extraction. Incorporate security scanning tools that detect vulnerable dependencies and enforce automated patching in CI/CD pipelines to prevent future exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6997b995d7880ec89b49375c

Added to database: 2/20/2026, 1:32:05 AM

Last enriched: 2/28/2026, 2:49:06 PM

Last updated: 4/5/2026, 10:10:45 PM

Views: 274

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses