CVE-2026-23950

node-tar · node-tar (and downstream products that bundle it)

A high-severity vulnerability has been identified in node-tar, a widely used software library for handling tar archives within Node.js applications.

Executive summary

A high-severity vulnerability has been identified in node-tar, a widely used software library for handling tar archives within Node.js applications. This flaw, with a CVSS score of 8.8, could allow an attacker to write files to arbitrary locations on a server by tricking an application into processing a malicious archive file. Successful exploitation could lead to a complete system compromise, allowing for data theft, service disruption, or further attacks on the network.

Vulnerability

The vulnerability is a path traversal flaw within the node-tar library's extraction functionality. An attacker can craft a malicious tar archive containing entries with specially-formed filenames (e.g., ../../../../tmp/exploit.sh). When a vulnerable application uses the node-tar library to extract this archive, it fails to properly sanitize the file paths, allowing the attacker to write files outside of the intended destination directory. This could be used to overwrite critical system files, application configuration files, or plant a web shell, leading to arbitrary code execution on the server.

Business impact

This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 8.8. Successful exploitation could result in a complete compromise of the affected server, leading to unauthorized access to sensitive corporate or customer data, intellectual property theft, and full system control by an attacker. The potential consequences include severe financial loss from operational downtime, data breach notification costs, and significant reputational damage. Given that node-tar is a fundamental dependency in countless Node.js projects, including development tools and production applications, the potential attack surface within the organization could be extensive.

Remediation

Immediate Action: Apply vendor security updates immediately. This involves identifying all projects using the vulnerable node-tar library, updating the package to a patched version in the project's dependencies (e.g., package.json), and redeploying the applications. Following the update, monitor for any signs of exploitation attempts and thoroughly review application and system access logs for anomalous file write activities or suspicious commands.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unexpected file creation or modification events in sensitive system directories (e.g., /etc, /bin, /var/www). Monitor application logs for errors or warnings related to file extraction processes. Network traffic should be analyzed for unusual outbound connections from application servers, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:

  • Input Validation: If possible, scan and validate any user-submitted or third-party tar archives before they are processed by the application.
  • Sandboxing: Run the application or the archive extraction process in a restricted, containerized environment (e.g., Docker) with a read-only filesystem and minimal permissions to limit the impact of an arbitrary file write.
  • File Integrity Monitoring (FIM): Deploy FIM tools on critical servers to provide real-time alerts on unauthorized changes to important system files or application code.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high severity (CVSS 8.8) of this vulnerability, we recommend immediate and prioritized action. All development and security teams should conduct an urgent inventory of their software assets to identify all applications and systems utilizing the vulnerable node-tar library. Patching of internet-facing systems should be considered the highest priority and completed immediately. Although this CVE is not currently on the CISA KEV list, its critical nature means it is a strong candidate for future inclusion, and organizations should treat it with the urgency of an actively exploited threat.