CVE-2025-69263

Published Jan 7, 2026

Last updated 14 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-69263 describes a vulnerability within the pnpm package manager, affecting versions 10.26.2 and earlier. The core of the issue lies in how pnpm handles HTTP tarball dependencies and git-hosted tarballs, storing them in the lockfile without integrity hashes. This omission allows a remote server to deliver varying content upon each installation, even when a lockfile is present and committed. An attacker can leverage this flaw by publishing a package that includes an HTTP tarball dependency. This enables them to serve different code to various users or CI/CD environments, bypassing the protection typically offered by a lockfile. The vulnerability has been addressed in pnpm version 10.26.0.

Description
pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. This allows the remote server to serve different content on each install, even when a lockfile is committed. An attacker who publishes a package with an HTTP tarball dependency can serve different code to different users or CI/CD environments. The attack requires the victim to install a package that has an HTTP/git tarball in its dependency tree. The victim's lockfile provides no protection. This issue is fixed in version 10.26.0.
Source
security-advisories@github.com
NVD status
Analyzed
Products
pnpm

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-494

Social media

Hype score
Not currently trending

Configurations