Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29764 | esm.sh has arbitrary file write via path traversal in `X-Zone-Id` header |
Github GHSA |
GHSA-g2h5-cvvr-7gmw | esm.sh has arbitrary file write via path traversal in `X-Zone-Id` header |
Wed, 14 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories. | esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories. Version 136.1 contains a patch. |
| References |
|
Thu, 18 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esm-dev
Esm-dev esmsh |
|
| Vendors & Products |
Esm-dev
Esm-dev esmsh |
Wed, 17 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | esm.sh is a nobuild content delivery network(CDN) for modern web development. In 136 and earlier, a path-traversal flaw in the handling of the X-Zone-Id HTTP header allows an attacker to cause the application to write files outside the intended storage location. The header value is used to build a filesystem path but is not properly canonicalized or restricted to the application’s storage base directory. As a result, supplying ../ sequences in X-Zone-Id causes files to be written to arbitrary directories. | |
| Title | esm.sh writes arbitrary files via path traversal in `X-Zone-Id` header | |
| Weaknesses | CWE-24 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-14T15:52:09.174Z
Reserved: 2025-09-12T12:36:24.636Z
Link: CVE-2025-59342
Updated: 2025-09-17T18:19:58.868Z
Status : Deferred
Published: 2025-09-17T18:15:53.550
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-59342
No data.
OpenCVE Enrichment
Updated: 2025-09-18T12:41:20Z
EUVD
Github GHSA