pnpm is a package manager. Prior to version 10.28.2, when pnpm processes a package's `directories.bin` field, it uses `path.join()` without validating the result stays within the package root. A malicious npm package can specify `"directories": {"bin": "../../../../tmp"}` to escape the package directory, causing pnpm to chmod 755 files at arbitrary locations. This issue only affects Unix/Linux/macOS. Windows is not affected (`fixBin` gated by `EXECUTABLE_SHEBANG_SUPPORTED`). Version 10.28.2 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/pnpm/pnpm/commit/17432ad5bbed5c2e77255ca6d56a1449bbcfd943 | Patch |
| https://github.com/pnpm/pnpm/releases/tag/v10.28.2 | Release Notes |
| https://github.com/pnpm/pnpm/security/advisories/GHSA-v253-rj99-jwpq | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-26 22:15
Updated : 2026-01-28 17:05
NVD link : CVE-2026-24131
Mitre link : CVE-2026-24131
CVE.ORG link : CVE-2026-24131
JSON object : View
Products Affected
pnpm
- pnpm
