Upstream information
Description
pnpm is a package manager. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. This issue has been patched in version(s) 7.33.4 and 8.6.8.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | SUSE |
|---|---|---|
| Base Score | 7.5 | 8.3 |
| Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
| Attack Vector | Network | Network |
| Attack Complexity | High | High |
| Privileges Required | Low | None |
| User Interaction | None | Required |
| Scope | Unchanged | Changed |
| Confidentiality Impact | High | High |
| Integrity Impact | High | High |
| Availability Impact | High | High |
| CVSSv3 Version | 3.1 | 3.1 |
| CVSS detail | SUSE |
|---|---|
| Base Score | 5.8 |
| Vector | CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H |
| Attack Vector | Network |
| Attack Complexity | High |
| Attack Requirements | Present |
| Privileges Required | None |
| User Interaction | Passive |
| Vulnerable System Confidentiality Impact | None |
| Vulnerable System Integrity Impact | Low |
| Vulnerable System Availability Impact | None |
| Subsequent System Confidentiality Impact | High |
| Subsequent System Integrity Impact | High |
| Subsequent System Availability Impact | High |
| CVSSv4 Version | 4.0 |
SUSE Timeline for this CVE
CVE page created: Tue Aug 1 16:03:55 2023CVE page last modified: Thu Jan 8 12:10:00 2026