Description
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
Published: 2026-01-28
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Creation/Overwrite via Hardlink Path Traversal
Action: Apply Patch
AI Analysis

Impact

The vulnerability in node‑tar versions earlier than 7.5.7 arises from a mismatch between the security check for hardlink entries and the actual hardlink creation logic. This flaw allows a malicious TAR archive to bypass directory traversal protections and create hardlinks to arbitrary files outside the intended extraction directory, thereby enabling the attacker to overwrite or create arbitrary files. The weakness is a classic instance of path traversal (CWE‑22) combined with improper path handling (CWE‑59).

Affected Systems

Any Node.js application that incorporates the node‑tar library (isaacs: node‑tar) with a version earlier than 7.5.7 is affected. The fix is delivered in node‑tar 7.5.7 and later, and review the application’s dependency tree for older versions.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity, but the EPSS exposure is below 1%, suggesting that, as of this analysis, the likelihood of exploitation is low. The attack requires an instance of node‑tar to extract a crafted TAR archive, which consequently allows creation of arbitrary hardlinks outside the extraction directory; this can result in corrupting or overwriting files. No CISA KEV entry exists for this CVE, so widespread exploitation has not yet been reported.

Generated by OpenCVE AI on April 18, 2026 at 14:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the node-tar package to version 7.5.7 or newer.
  • If an upgrade is not immediately feasible, configure the application to extract archives to a non‑writable, sandboxed directory or to disable hardlink creation during extraction if the API permits.
  • Audit the npm dependency tree to ensure no older versions of node‑tar remain and remove any unused legacy packages.

Generated by OpenCVE AI on April 18, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4552-1 node-tar security update
Github GHSA Github GHSA GHSA-34x7-hfp2-rc4v node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
History

Mon, 02 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:isaacs:tar:*:*:*:*:*:node.js:*:*

Thu, 29 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Isaacs
Isaacs tar
Vendors & Products Isaacs
Isaacs tar

Wed, 28 Jan 2026 00:30:00 +0000

Type Values Removed Values Added
Description node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
Title node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
Weaknesses CWE-22
CWE-59
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T14:56:10.317Z

Reserved: 2026-01-27T14:51:03.059Z

Link: CVE-2026-24842

cve-icon Vulnrichment

Updated: 2026-01-28T14:56:06.877Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T01:16:14.947

Modified: 2026-02-02T14:30:10.890

Link: CVE-2026-24842

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-28T00:20:13Z

Links: CVE-2026-24842 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses