Back to list

esm.sh: Path Traversal via package.json browser field allows reading arbitrary server files — CVE-2026-44594

GitHub · GitHub · CVE-2026-44594

ID
CVE-2026-44594
Date
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
7.5

Summary

### Summary A Local File Inclusion (LFI) vulnerability exists in the esbuild plugin's handling of the `browser` field in `package.json`. An attacker can publish an npm package that causes the server to read and return arbitrary files from the host filesystem during the build process. ### Details The vulnerable code is in the `OnResolve` callback of the esbuild plugin:…

Product

go: github.com/esm-dev/esm.sh

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories