icon

We found results for “

CVE-2026-24056

Good to know:

icon
icon

Date: January 26, 2026

pnpm is a package manager. Prior to version 10.28.2, when pnpm installs a "file:" (directory) or "git:" dependency, it follows symlinks and reads their target contents without constraining them to the package root. A malicious package containing a symlink to an absolute path (e.g., "/etc/passwd", "~/.ssh/id_rsa") causes pnpm to copy that file's contents into "node_modules", leaking local data. The vulnerability only affects "file:" and "git:" dependencies. Registry packages (npm) have symlinks stripped during publish and are NOT affected. The issue impacts developers installing local/file dependencies andCI/CD pipelines installing git dependencies. It can lead to credential theft via symlinks to "~/.aws/credentials", "~/.npmrc", "~/.ssh/id_rsa". Version 10.28.2 contains a patch.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Link Resolution Before File Access ('Link Following')

CWE-59

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

Top Fix

icon

Upgrade Version

Upgrade to version pnpm - 10.28.2;https://github.com/pnpm/pnpm.git - v10.28.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us