Description
Turborepo is a high-performance build system for JavaScript and TypeScript codebases. From 1.1.0 to before 2.9.14, Turborepo can be vulnerable to arbitrary code execution when run in untrusted repositories that contain malicious Yarn configuration. In affected versions, package manager detection executed yarn --version from the project directory, which could cause Yarn to load and execute a project-controlled yarnPath from .yarnrc.yml. An attacker who controls repository contents could cause code execution when a user or CI system runs affected turbo, @turbo/codemod, or @turbo/workspace conversion commands. This vulnerability is fixed in 2.9.14.
Published: 2026-05-15
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Turborepo builds JavaScript and TypeScript codebases, and between versions 1.1.0 and before 2.9.14 it can execute arbitrary code when a user or CI system runs turbo commands on a repository that contains a malicious .yarnrc.yml. During Yarn Berry detection the tool runs yarn --version from the project directory, which may trigger Yarn to load a project‑controlled yarnPath. An attacker who controls repository contents can place malicious code in the yarnPath and have it executed when turbo, @turbo/codemod, or @turbo/workspace conversion commands run. This flaw allows attackers to run code with the privileges of the user or CI job.

Affected Systems

The affected products are Turborepo by Vercel, with vulnerable releases from 1.1.0 up to (but not including) 2.9.14, as well as the related @turbo/codemod and @turbo/workspaces packages. Upgrade to 2.9.14 or later eliminates the flaw.

Risk and Exploitability

The flaw enables arbitrary code execution on the local system or within CI pipelines. No CVSS score is provided in the advisory, so the numerical severity cannot be stated. The vulnerability is not listed in CISA's KEV catalog. The likely attack vector involves an attacker placing a malicious repository that is later processed by a user or automated build via turbo. Because the vulnerability is triggered by Yarn Berry detection, it will be activated whenever those tools run on a repository containing a crafted .yarnrc.yml. In environments where untrusted code is routinely processed, the risk is significant.

Generated by OpenCVE AI on May 15, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Turborepo, @turbo/codemod, and @turbo/workspaces to version 2.9.14 or later.
  • Restrict CI jobs to run turbo only against trusted repositories until the update is applied.
  • Validate repository contents or enforce a policy that blocks commits containing .yarnrc.yml with a yarnPath field from untrusted sources.

Generated by OpenCVE AI on May 15, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description Turborepo is a high-performance build system for JavaScript and TypeScript codebases. From 1.1.0 to before 2.9.14, Turborepo can be vulnerable to arbitrary code execution when run in untrusted repositories that contain malicious Yarn configuration. In affected versions, package manager detection executed yarn --version from the project directory, which could cause Yarn to load and execute a project-controlled yarnPath from .yarnrc.yml. An attacker who controls repository contents could cause code execution when a user or CI system runs affected turbo, @turbo/codemod, or @turbo/workspace conversion commands. This vulnerability is fixed in 2.9.14.
Title Turborepo: Unexpected local code execution during Yarn Berry detection
Weaknesses CWE-426
References
Metrics cvssV4_0

{'score': 0, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T17:54:06.401Z

Reserved: 2026-05-13T07:45:21.251Z

Link: CVE-2026-45772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T16:16:14.987

Modified: 2026-05-15T16:16:14.987

Link: CVE-2026-45772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T18:00:05Z

Weaknesses