Wiz Agents & Workflows are here

CVE-2020-12265
JavaScript vulnerability analysis and mitigation

Overview

The decompress package before version 4.2.1 for Node.js contains a critical path traversal vulnerability (CVE-2020-12265) that was discovered in April 2020. This vulnerability allows attackers to perform arbitrary file writes via '../' in archive members when a symlink is used, enabling directory traversal attacks. The vulnerability affects all versions of the decompress package prior to 4.2.1 (NVD, GitHub Advisory).

Technical details

The vulnerability stems from the package's failure to properly validate file paths during archive extraction. When processing archive files containing symlinks or path traversal sequences ('../'), the package allows writing files to arbitrary locations outside the intended extraction directory. The vulnerability has received a CVSS v3.1 score of 9.8 (Critical), indicating its severe impact. The issue is tracked as CWE-22 (Path Traversal) and CWE-59 (Link Following) (GitHub Advisory).

Impact

This vulnerability can be exploited to write files to arbitrary locations on the filesystem, potentially leading to system compromise. An attacker can craft a malicious archive that, when extracted, could write files outside the intended extraction directory, potentially overwriting system files or adding malicious content to sensitive locations (GitHub Issue).

Mitigation and workarounds

The recommended mitigation is to upgrade to decompress version 4.2.1 or later, which includes the security fix. The fix prevents directory traversal by implementing proper path validation and symlink handling. The patch was implemented through PR #73, which adds checks to ensure files cannot be written outside the intended extraction directory (GitHub PR).

Community reactions

The vulnerability has received significant attention in the Node.js ecosystem due to its widespread impact through various dependency chains, affecting popular packages like gatsby-plugin-sharp. The community actively participated in discussing and testing various fix approaches, leading to a comprehensive security patch that handles both direct path traversal and symlink-based attacks (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management