Lookup for vulnerable packages by Package URL.

Purlpkg:npm/npm@8.11.0
Typenpm
Namespace
Namenpm
Version8.11.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-qyqn-hwvx-k7gs
vulnerability_id VCID-qyqn-hwvx-k7gs
summary
Duplicate Advisory: npm cli Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
### Duplicate Advisory
This advisory has been withdrawn because describes a dependency bump and therefore, per [CVE CNA rule 4.1.12](https://www.cve.org/ResourcesSupport/AllResources/CNARules/#section_4-1_Vulnerability_Determination), is a duplicate of GHSA-34x7-hfp2-rc4v/CVE-2026-24842. Additionally, per https://github.com/npm/cli/issues/8939#issuecomment-3862719883, npm cli should not be listed as an affected product. This link is maintained to preserve external references.

### Original Description
npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the handling of modules. The application loads modules from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0775.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0775
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01109
published_at 2026-04-16T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-13T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01116
published_at 2026-04-12T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01121
published_at 2026-04-18T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01137
published_at 2026-04-09T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01131
published_at 2026-04-07T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01125
published_at 2026-04-04T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01122
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0775
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/npm/cli
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli
5
reference_url https://github.com/npm/cli/issues/8939
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli/issues/8939
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-0775
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-0775
7
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-043
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.zerodayinitiative.com/advisories/ZDI-26-043
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126756
reference_id 1126756
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2432280
reference_id 2432280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2432280
10
reference_url https://github.com/advisories/GHSA-3966-f6p6-2qr9
reference_id GHSA-3966-f6p6-2qr9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3966-f6p6-2qr9
11
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-043/
reference_id ZDI-26-043
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-24T04:55:29Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-043/
fixed_packages
aliases CVE-2026-0775, GHSA-3966-f6p6-2qr9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyqn-hwvx-k7gs
Fixing_vulnerabilities
0
url VCID-x6cv-wu7q-nqa6
vulnerability_id VCID-x6cv-wu7q-nqa6
summary
Packing does not respect root-level ignore files in workspaces
### Impact
`npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7.13.0](https://github.com/npm/cli/releases/tag/v7.13.0) respectively, may be affected and have published files into the npm registry they did not intend to include.

### Patch
- Upgrade to the latest, patched version of `npm` ([`v8.11.0`](https://github.com/npm/cli/releases/tag/v8.11.0) or greater), run: `npm i -g npm@latest`
- Node.js versions [`v16.15.1`](https://github.com/nodejs/node/releases/tag/v16.15.1), [`v17.19.1`](https://github.com/nodejs/node/releases/tag/v17.9.1) & [`v18.3.0`](https://github.com/nodejs/node/releases/tag/v18.3.0) include the patched `v8.11.0` version of `npm`

#### Steps to take to see if you're impacted
1. Run `npm publish --dry-run` or `npm pack` with an `npm` version `>=7.9.0` & `<8.11.0` inside the project's root directory using a workspace flag like: `--workspaces` or `--workspace=<name>` (ex. `npm pack --workspace=foo`)
2. Check the output in your terminal which will list the package contents (note: `tar -tvf <package-on-disk>` also works)
3. If you find that there are files included you did not expect, you should:
  3.1. Create & publish a new release excluding those files (ref. ["Keeping files out of your Package"](https://docs.npmjs.com/cli/v8/using-npm/developers#keeping-files-out-of-your-package))
  3.2. Deprecate the old package (ex. `npm deprecate <pkg>[@<version>] <message>`)
  3.3. Revoke or rotate any sensitive information (ex. passwords, tokens, secrets etc.) which might have been exposed
### References
- [CVE-2022-29244](https://nvd.nist.gov/vuln/detail/CVE-2022-29244)
- [`npm-packlist`](https://github.com/npm/npm-packlist)
- [`libnpmpack`](https://github.com/npm/cli/tree/latest/workspaces/libnpmpack)
- [`libnpmpublish`](https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29244.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29244
reference_id
reference_type
scores
0
value 0.01074
scoring_system epss
scoring_elements 0.77801
published_at 2026-04-18T12:55:00Z
1
value 0.01074
scoring_system epss
scoring_elements 0.77802
published_at 2026-04-16T12:55:00Z
2
value 0.01074
scoring_system epss
scoring_elements 0.77765
published_at 2026-04-13T12:55:00Z
3
value 0.01074
scoring_system epss
scoring_elements 0.77766
published_at 2026-04-12T12:55:00Z
4
value 0.01074
scoring_system epss
scoring_elements 0.77782
published_at 2026-04-11T12:55:00Z
5
value 0.01074
scoring_system epss
scoring_elements 0.77756
published_at 2026-04-09T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-02T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.77739
published_at 2026-04-04T12:55:00Z
8
value 0.01074
scoring_system epss
scoring_elements 0.77723
published_at 2026-04-07T12:55:00Z
9
value 0.01074
scoring_system epss
scoring_elements 0.77751
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29244
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/node/pull/43210
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/nodejs/node/pull/43210
4
reference_url https://github.com/nodejs/node/releases/tag/v16.15.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/nodejs/node/releases/tag/v16.15.1
5
reference_url https://github.com/nodejs/node/releases/tag/v17.9.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/nodejs/node/releases/tag/v17.9.1
6
reference_url https://github.com/nodejs/node/releases/tag/v18.3.0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/nodejs/node/releases/tag/v18.3.0
7
reference_url https://github.com/npm/cli
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli
8
reference_url https://github.com/npm/cli/releases/tag/v8.11.0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/npm/cli/releases/tag/v8.11.0
9
reference_url https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52
10
reference_url https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/npm/cli/tree/latest/workspaces/libnpmpack
11
reference_url https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish
12
reference_url https://github.com/npm/npm-packlist
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://github.com/npm/npm-packlist
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29244
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29244
14
reference_url https://security.netapp.com/advisory/ntap-20220722-0007
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220722-0007
15
reference_url https://security.netapp.com/advisory/ntap-20220722-0007/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T16:23:19Z/
url https://security.netapp.com/advisory/ntap-20220722-0007/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2098556
reference_id 2098556
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2098556
17
reference_url https://github.com/advisories/GHSA-hj9c-8jmm-8c52
reference_id GHSA-hj9c-8jmm-8c52
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hj9c-8jmm-8c52
18
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
fixed_packages
0
url pkg:npm/npm@8.11.0
purl pkg:npm/npm@8.11.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qyqn-hwvx-k7gs
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/npm@8.11.0
aliases CVE-2022-29244, GHSA-hj9c-8jmm-8c52, GMS-2022-1719
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6cv-wu7q-nqa6
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/npm@8.11.0