{"id":"CVE-2026-29786","summary":"node-tar: Hardlink Path Traversal via Drive-Relative Linkpath","details":"node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.","aliases":["GHSA-qffp-2rhf-9h96"],"modified":"2026-05-18T05:59:45.618909576Z","published":"2026-03-07T15:32:22.748Z","related":["CGA-pmvh-3vx6-fx2v"],"database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/29xxx/CVE-2026-29786.json","cwe_ids":["CWE-22","CWE-59"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/29xxx/CVE-2026-29786.json"},{"type":"ADVISORY","url":"https://github.com/isaacs/node-tar/security/advisories/GHSA-qffp-2rhf-9h96"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29786"},{"type":"FIX","url":"https://github.com/isaacs/node-tar/commit/7bc755dd85e623c0279e08eb3784909e6d7e4b9f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/isaacs/node-tar","events":[{"introduced":"0"},{"fixed":"2b72abc1d47c3570e1ad95c9ab557fc4c2e6e4b1"}]}],"versions":["v7.5.9","v7.5.8","v7.5.7","v7.5.6","v7.5.5","v7.5.4","v7.5.3","v7.5.2","v7.5.1","v7.5.0","v7.4.4","v7.4.3","v7.4.2","v7.4.1","v7.4.0","v7.3.0","v7.2.0","v7.1.0","v7.0.1","v7.0.0","v6.2.1","v6.2.0","v6.1.15","v6.1.14","v6.1.13","v6.1.12","v6.1.11","v6.1.10","v6.1.9","v6.1.8","v6.1.7","v6.1.6","v6.1.5","v6.1.4","v6.1.3","v6.1.2","v6.1.1","v4.4.13","v5.0.5","v6.1.0","v6.0.5","v6.0.4","v6.0.3","v6.0.2","v6.0.1","v6.0.0","v5.0.2","v5.0.4","v5.0.3","v5.0.1","v4.4.12","v4.4.11","v4.4.10","v4.4.9","v2.2.1","v4.4.8","v4.4.7","v4.4.6","v4.4.5","v4.4.4","v4.4.3","v4.4.2","v4.4.1","v4.4.0","v4.3.3","v4.3.2","v4.3.1","v4.3.0","v4.2.0","v4.1.2","v4.1.1","v4.1.0","v4.0.2","v4.0.1","v3.2.0","v4.0.0","v3.1.15","v3.1.14","v3.1.13","v3.1.12","v3.1.11","v3.1.10","v3.1.9","v3.1.8","v3.1.7","v3.1.6","v3.1.5","v3.1.4","v3.1.3","v3.1.2","v3.1.1","v3.1.0","v3.0.1","v3.0.0","v2.1.1","v2.1.0","v2.0.1","v2.0.0","v1.0.3","v1.0.2","v1.0.1","v1.0.0","v0.1.20","v0.1.19","v0.1.18","v0.1.17","v0.1.16","v0.1.15","v0.1.14","0.1.13","0.1.12","0.1.11","0.1.10","0.1.9","0.1.8","0.1.7","0.1.6","0.1.5","0.1.3","0.1.2","0.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-29786.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L"}]}