Description
node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
Published: 2026-03-07
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Uncontrolled local file overwrite during tar extraction potentially leading to privilege escalation
Action: Patch Immediately
AI Analysis

Impact

node-tar, a widely used tar implementation for Node.js, can be deceived into creating a hardlink that points outside the intended extraction directory when a drive-relative link target such as C:../target.txt is provided. This flaw allows an attacker to overwrite arbitrary files on the filesystem during normal tar.x() extraction. The weakness is a form of path traversal (CWE-22) coupled with improper path handling on systems that recognize drive-relative syntax (CWE-59). The resulting impact is corruption or replacement of files that exist outside the extraction home, which under elevated privileges could render the system inoperable or compromise data integrity.

Affected Systems

Any Node.js project that depends on the isaacs node-tar library before version 7.5.10 is potentially affected. The issue manifests in environments where tar extraction is performed by the application, including local scripts, build processes, or automated deployment pipelines. Because the hardlink target uses a drive-relative path, the bug is primarily relevant on platforms that support such syntax, with Windows being the most likely target. All installations of node-tar older than 7.5.10 should be considered at risk until the library is upgraded.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.2, indicating a high severity that encompasses confidentiality, integrity, and availability concerns. The EPSS score is reported as less than 1%, suggesting a very low current probability of exploitation. It is not listed in the CISA KEV catalog, meaning no widespread exploitation has been observed yet. However, the attack vector is inferred to require delivery of a malicious tar archive to a process that performs extraction, which is plausible in many development and deployment scenarios. If the extraction occurs with elevated privileges, the attacker could achieve local privilege escalation or complete system compromise by overwriting critical system or application files.

Generated by OpenCVE AI on April 16, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update node-tar to version 7.5.10 or later to apply the vendor patch
  • If an upgrade is not immediately feasible, disable hardlink support in tar extraction options or validate extracted paths to ensure they resolve within the intended directory
  • Run tar extraction processes as a non-privileged user and enforce filesystem permissions to limit the impact of potential file overwrites

Generated by OpenCVE AI on April 16, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4552-1 node-tar security update
Github GHSA Github GHSA GHSA-qffp-2rhf-9h96 tar has Hardlink Path Traversal via Drive-Relative Linkpath
History

Wed, 11 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:isaacs:tar:*:*:*:*:*:node.js:*:*
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}


Tue, 10 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}

threat_severity

Important


Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Isaacs
Isaacs tar
Vendors & Products Isaacs
Isaacs tar

Sat, 07 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.
Title node-tar: Hardlink Path Traversal via Drive-Relative Linkpath
Weaknesses CWE-22
CWE-59
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:26:34.057Z

Reserved: 2026-03-04T16:26:02.899Z

Link: CVE-2026-29786

cve-icon Vulnrichment

Updated: 2026-03-09T17:52:30.538Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T16:15:55.587

Modified: 2026-03-11T21:50:01.910

Link: CVE-2026-29786

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-07T15:32:22Z

Links: CVE-2026-29786 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses