{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-65025","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-13T15:36:51.682Z","datePublished":"2025-11-19T17:32:46.835Z","dateUpdated":"2025-11-20T14:09:44.277Z"},"containers":{"cna":{"title":"esm.sh CDN service has arbitrary file write via tarslip","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/esm-dev/esm.sh/security/advisories/GHSA-h3mw-4f23-gwpw","tags":["x_refsource_CONFIRM"],"url":"https://github.com/esm-dev/esm.sh/security/advisories/GHSA-h3mw-4f23-gwpw"},{"name":"https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16","tags":["x_refsource_MISC"],"url":"https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16"}],"affected":[{"vendor":"esm-dev","product":"esm.sh","versions":[{"version":"< 136","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-19T17:32:46.835Z"},"descriptions":[{"lang":"en","value":"esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing specially crafted file paths (e.g., package/../../tmp/evil.js). When esm.sh downloads and extracts this package, files may be written to arbitrary locations on the server, escaping the intended extraction directory. This issue has been patched in version 136."}],"source":{"advisory":"GHSA-h3mw-4f23-gwpw","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/esm-dev/esm.sh/security/advisories/GHSA-h3mw-4f23-gwpw","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-20T14:09:39.459957Z","id":"CVE-2025-65025","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-20T14:09:44.277Z"}}]}}