Home

Description

pnpm is a package manager. Prior to version 10.28.2, when pnpm installs a `file:` (directory) or `git:` dependency, it follows symlinks and reads their target contents without constraining them to the package root. A malicious package containing a symlink to an absolute path (e.g., `/etc/passwd`, `~/.ssh/id_rsa`) causes pnpm to copy that file's contents into `node_modules`, leaking local data. The vulnerability only affects `file:` and `git:` dependencies. Registry packages (npm) have symlinks stripped during publish and are NOT affected. The issue impacts developers installing local/file dependencies andCI/CD pipelines installing git dependencies. It can lead to credential theft via symlinks to `~/.aws/credentials`, `~/.npmrc`, `~/.ssh/id_rsa`. Version 10.28.2 contains a patch.

PUBLISHED Reserved 2026-01-20 | Published 2026-01-26 | Updated 2026-01-27 | Assigner GitHub_M




MEDIUM: 6.7CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

< 10.28.2
affected

References

github.com/pnpm/pnpm/security/advisories/GHSA-m733-5w8f-5ggw

github.com/...ommit/b277b45bc35ae77ca72d7634d144bbd58a48b70f

github.com/pnpm/pnpm/releases/tag/v10.28.2

cve.org (CVE-2026-24056)

nvd.nist.gov (CVE-2026-24056)

Download JSON