Home

Description

esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing specially crafted file paths (e.g., package/../../tmp/evil.js). When esm.sh downloads and extracts this package, files may be written to arbitrary locations on the server, escaping the intended extraction directory. This issue has been patched in version 136.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-19 | Updated 2025-11-20 | Assigner GitHub_M




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 136
affected

References

github.com/...esm.sh/security/advisories/GHSA-h3mw-4f23-gwpw exploit

github.com/...esm.sh/security/advisories/GHSA-h3mw-4f23-gwpw

github.com/...ommit/9d77b88c320733ff6689d938d85d246a3af9af16

cve.org (CVE-2025-65025)

nvd.nist.gov (CVE-2025-65025)

Download JSON