{"id":"CVE-2026-31802","summary":"node-tar Symlink Path Traversal via Drive-Relative Linkpath","details":"node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.","aliases":["GHSA-9ppj-qmqm-q256"],"modified":"2026-04-10T05:42:08.941905Z","published":"2026-03-09T21:11:56.668Z","related":["CGA-w37q-mf7c-963v"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-22"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31802.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31802.json"},{"type":"ADVISORY","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-9ppj-qmqm-q256"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31802"},{"type":"FIX","url":"https://github.com/isaacs/node-tar/commit/f48b5fa3b7985ddab96dc0f2125a4ffc9911b6ad"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isaacs/node-tar","events":[{"introduced":"0"},{"fixed":"bf776f673164215074b62749e0fe80e5834588f4"}]}],"versions":["0.1.0","0.1.10","0.1.11","0.1.12","0.1.13","0.1.2","0.1.3","0.1.5","0.1.6","0.1.7","0.1.8","0.1.9","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.20","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v2.0.0","v2.0.1","v2.1.0","v2.1.1","v2.2.1","v3.0.0","v3.0.1","v3.1.0","v3.1.1","v3.1.10","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9","v3.2.0","v4.0.0","v4.0.1","v4.0.2","v4.1.0","v4.1.1","v4.1.2","v4.2.0","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.4.0","v4.4.1","v4.4.10","v4.4.11","v4.4.12","v4.4.13","v4.4.2","v4.4.3","v4.4.4","v4.4.5","v4.4.6","v4.4.7","v4.4.8","v4.4.9","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v6.0.0","v6.0.1","v6.0.2","v6.0.3","v6.0.4","v6.0.5","v6.1.0","v6.1.1","v6.1.10","v6.1.11","v6.1.12","v6.1.13","v6.1.14","v6.1.15","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.1.9","v6.2.0","v6.2.1","v7.0.0","v7.0.1","v7.1.0","v7.2.0","v7.3.0","v7.4.0","v7.4.1","v7.4.2","v7.4.3","v7.4.4","v7.5.0","v7.5.1","v7.5.10","v7.5.2","v7.5.3","v7.5.4","v7.5.5","v7.5.6","v7.5.7","v7.5.8","v7.5.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31802.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N"}]}