CVE-2025-59343
JavaScript vulnerability analysis and mitigation

Overview

tar-fs, a package that provides filesystem bindings for tar-stream, has been identified with a symlink validation bypass vulnerability (CVE-2025-59343). The vulnerability affects versions prior to 3.1.1, 2.1.3, and 1.16.5, where attackers could bypass symlink validation if the destination directory is predictable with a specific tarball. The issue was discovered and reported by Mapta / BugBunny_ai and was disclosed on September 24, 2025 (GitHub Advisory).

Technical details

The vulnerability stems from an insufficient path validation mechanism in the tar-fs package. The issue specifically relates to how the package validates paths when handling symbolic links. The vulnerability has received a CVSS v4.0 Base Score of 8.7 (HIGH) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N. The weakness has been categorized under CWE-22 (Path Traversal) and CWE-61 (UNIX Symbolic Link Following) (NVD).

Impact

The vulnerability could allow attackers to bypass symlink validation mechanisms when the destination directory is predictable, potentially leading to unauthorized access or manipulation of files outside the intended directory structure (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 3.1.1, 2.1.4, and 1.16.6. As a workaround, users can implement the ignore option to ignore non-files/directories using the following pattern: ignore (_, header) { return header.type ! 'file' && header.type ! 'directory' }. The fix involves expanding the path validation check to properly handle directory separators (GitHub Commit, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59834CRITICAL9.8
  • JavaScriptJavaScript
  • adb-mcp
NoNoSep 24, 2025
CVE-2025-59343HIGH8.7
  • JavaScriptJavaScript
  • tar-fs
NoYesSep 24, 2025
CVE-2025-59828HIGH7.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesSep 24, 2025
GHSA-xh92-rqrq-227vMEDIUM6.5
  • JavaScriptJavaScript
  • @mastra/mcp-docs-server
NoYesSep 24, 2025
CVE-2025-59426MEDIUM4.3
  • JavaScriptJavaScript
  • @lobehub/chat
NoYesSep 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management