Vulnerability Description
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing specially crafted file paths (e.g., package/../../tmp/evil.js). When esm.sh downloads and extracts this package, files may be written to arbitrary locations on the server, escaping the intended extraction directory. This issue has been patched in version 136.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Esm | Esm.Sh | < 136 |
Related Weaknesses (CWE)
References
- https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af1Patch
- https://github.com/esm-dev/esm.sh/security/advisories/GHSA-h3mw-4f23-gwpwExploitVendor Advisory
- https://github.com/esm-dev/esm.sh/security/advisories/GHSA-h3mw-4f23-gwpwExploitVendor Advisory
FAQ
What is CVE-2025-65025?
CVE-2025-65025 is a vulnerability with a CVSS score of 8.2 (HIGH). esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An att...
How severe is CVE-2025-65025?
CVE-2025-65025 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65025?
Check the references section above for vendor advisories and patch information. Affected products include: Esm Esm.Sh.