Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h3mw-4f23-gwpw | esm.sh CDN service has arbitrary file write via tarslip |
Thu, 15 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esm
Esm esm.sh |
|
| CPEs | cpe:2.3:a:esm:esm.sh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Esm
Esm esm.sh |
Fri, 21 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esm-dev
Esm-dev esmsh |
|
| Vendors & Products |
Esm-dev
Esm-dev esmsh |
Thu, 20 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing specially crafted file paths (e.g., package/../../tmp/evil.js). When esm.sh downloads and extracts this package, files may be written to arbitrary locations on the server, escaping the intended extraction directory. This issue has been patched in version 136. | |
| Title | esm.sh CDN service has arbitrary file write via tarslip | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-20T14:09:44.277Z
Reserved: 2025-11-13T15:36:51.682Z
Link: CVE-2025-65025
Updated: 2025-11-20T14:08:43.868Z
Status : Analyzed
Published: 2025-11-19T18:15:49.840
Modified: 2026-01-15T17:52:38.600
Link: CVE-2025-65025
No data.
OpenCVE Enrichment
Updated: 2025-11-21T09:16:16Z
Github GHSA