CVE-2026-29786: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-29786 affects the node-tar package, a widely used Node.js library for handling tar archives. Prior to version 7.5.10, node-tar improperly limits pathname resolution when extracting tar files, specifically failing to correctly handle drive-relative hardlink targets such as 'C:../target.txt'. This flaw allows an attacker to create a tar archive that, when extracted, can write files outside the intended extraction directory by exploiting path traversal via hardlinks. This behavior violates the principle of restricting file operations to a safe directory, enabling potential overwriting of arbitrary files on the host system. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-59 (Link Following). Exploitation requires a victim to extract a malicious tarball, which could be delivered via social engineering or compromised software distributions. The CVSS 4.0 base score is 8.2, reflecting high severity due to the potential for integrity and availability impact, ease of exploitation without privileges, and the broad scope of affected systems using node-tar. The issue was publicly disclosed on March 7, 2026, and patched in node-tar version 7.5.10. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability poses a significant risk to organizations relying on node-tar for archive extraction, especially in automated deployment pipelines, CI/CD systems, or any environment where tar files are extracted from untrusted or semi-trusted sources. Successful exploitation can lead to arbitrary file overwrites outside the extraction directory, potentially allowing attackers to modify critical system files, inject malicious code, or disrupt application functionality. This compromises system integrity and could lead to denial of service or further escalation if critical configuration or executable files are overwritten. The impact is amplified in environments where node-tar is used with elevated privileges or in production systems. Given node-tar's popularity in the Node.js ecosystem, a wide range of organizations, from software vendors to cloud service providers, could be affected. Although no active exploitation is known, the vulnerability's nature and ease of exploitation make it a high-risk issue requiring prompt remediation.
Mitigation Recommendations
Organizations should immediately upgrade all instances of node-tar to version 7.5.10 or later to ensure the vulnerability is patched. Additionally, implement strict validation and sanitization of tar archives before extraction, especially those received from untrusted or external sources. Employ sandboxed or isolated environments for archive extraction to limit potential damage from malicious files. Integrate automated scanning tools to detect vulnerable node-tar versions in software dependencies and CI/CD pipelines. Educate developers and operations teams about the risks of extracting archives from unverified sources. Where possible, use alternative archive formats or libraries with stronger security guarantees. Monitor systems for unexpected file modifications that could indicate exploitation attempts. Finally, maintain robust backup and recovery procedures to restore systems in case of compromise.
Affected Countries
United States, Germany, United Kingdom, India, China, Japan, Canada, Australia, France, Netherlands
CVE-2026-29786: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
Description
node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-29786 affects the node-tar package, a widely used Node.js library for handling tar archives. Prior to version 7.5.10, node-tar improperly limits pathname resolution when extracting tar files, specifically failing to correctly handle drive-relative hardlink targets such as 'C:../target.txt'. This flaw allows an attacker to create a tar archive that, when extracted, can write files outside the intended extraction directory by exploiting path traversal via hardlinks. This behavior violates the principle of restricting file operations to a safe directory, enabling potential overwriting of arbitrary files on the host system. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-59 (Link Following). Exploitation requires a victim to extract a malicious tarball, which could be delivered via social engineering or compromised software distributions. The CVSS 4.0 base score is 8.2, reflecting high severity due to the potential for integrity and availability impact, ease of exploitation without privileges, and the broad scope of affected systems using node-tar. The issue was publicly disclosed on March 7, 2026, and patched in node-tar version 7.5.10. No known exploits have been reported in the wild to date.
Potential Impact
This vulnerability poses a significant risk to organizations relying on node-tar for archive extraction, especially in automated deployment pipelines, CI/CD systems, or any environment where tar files are extracted from untrusted or semi-trusted sources. Successful exploitation can lead to arbitrary file overwrites outside the extraction directory, potentially allowing attackers to modify critical system files, inject malicious code, or disrupt application functionality. This compromises system integrity and could lead to denial of service or further escalation if critical configuration or executable files are overwritten. The impact is amplified in environments where node-tar is used with elevated privileges or in production systems. Given node-tar's popularity in the Node.js ecosystem, a wide range of organizations, from software vendors to cloud service providers, could be affected. Although no active exploitation is known, the vulnerability's nature and ease of exploitation make it a high-risk issue requiring prompt remediation.
Mitigation Recommendations
Organizations should immediately upgrade all instances of node-tar to version 7.5.10 or later to ensure the vulnerability is patched. Additionally, implement strict validation and sanitization of tar archives before extraction, especially those received from untrusted or external sources. Employ sandboxed or isolated environments for archive extraction to limit potential damage from malicious files. Integrate automated scanning tools to detect vulnerable node-tar versions in software dependencies and CI/CD pipelines. Educate developers and operations teams about the risks of extracting archives from unverified sources. Where possible, use alternative archive formats or libraries with stronger security guarantees. Monitor systems for unexpected file modifications that could indicate exploitation attempts. Finally, maintain robust backup and recovery procedures to restore systems in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.899Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ac4840c48b3f10ffa9ddda
Added to database: 3/7/2026, 3:46:08 PM
Last enriched: 3/7/2026, 4:00:21 PM
Last updated: 3/8/2026, 3:52:26 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.