{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:55:55.060","vulnerabilities":[{"cve":{"id":"CVE-2026-24884","sourceIdentifier":"security-advisories@github.com","published":"2026-02-04T20:16:05.703","lastModified":"2026-02-27T20:27:32.587","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior, Compressing extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the intended extraction directory, an attacker can cause subsequent file entries to be written to arbitrary locations on the host file system. Depending on the extractor’s handling of existing files, this behavior may allow overwriting sensitive files or creating new files in security-critical locations. This issue has been patched in versions 1.10.4 and 2.0.1."},{"lang":"es","value":"Compressing es una librería de compresión y descompresión para node. En las versiones 2.0.0 y 1.10.3 y anteriores, Compressing extrae archivos TAR mientras restaura enlaces simbólicos sin validar sus destinos. Al incrustar enlaces simbólicos que se resuelven fuera del directorio de extracción previsto, un atacante puede hacer que las entradas de archivos subsiguientes se escriban en ubicaciones arbitrarias en el sistema de archivos del host. Dependiendo de cómo el extractor maneje los archivos existentes, este comportamiento puede permitir sobrescribir archivos sensibles o crear nuevos archivos en ubicaciones críticas para la seguridad. Este problema ha sido parcheado en las versiones 1.10.4 y 2.0.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:node-modules:compressing:*:*:*:*:*:node.js:*:*","versionEndExcluding":"1.10.4","matchCriteriaId":"7FD0D71B-4E26-469A-BC9C-DCB66097E813"},{"vulnerable":true,"criteria":"cpe:2.3:a:node-modules:compressing:2.0.0:*:*:*:*:node.js:*:*","matchCriteriaId":"DF61D84F-AAB3-47A3-BB3A-0D35E654643E"}]}]}],"references":[{"url":"https://github.com/node-modules/compressing/commit/8d16c196c7f1888fc1af957d9ff36117247cea6c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/node-modules/compressing/commit/ce1c0131c401c071c77d5a1425bf8c88cfc16361","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/node-modules/compressing/security/advisories/GHSA-cc8f-xg8v-72m3","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}