Skip to content

v3.x: onnxruntime-node@1.21.0 pulls in vulnerable tar (<7.5.8) — CVE-2026-26960 #1550

@emiluzelac

Description

@emiluzelac

Summary

@huggingface/transformers@3.8.1 depends on onnxruntime-node@1.21.0, which
depends on tar@^7.0.1. This exposes downstream consumers to
CVE-2026-26960 (High 7.1 —
arbitrary file read/write via hardlink target escape through symlink chain).

Dependency chain

@huggingface/transformers@3.8.1
  └── onnxruntime-node@1.21.0
        └── tar@^7.0.1 (resolved ≤7.5.7, vulnerable)

Fix available upstream

  • tar fixed the vulnerability in 7.5.8 (current: 7.5.9).
  • onnxruntime-node removed tar entirely in v1.22.0, switching to
    adm-zip. Current latest is 1.24.2.
  • @huggingface/transformers v4.0.0-next already uses onnxruntime-node@1.24.1,
    so this is resolved in v4 preview but not in stable v3.

Request

Could onnxruntime-node be bumped to >=1.22.0 in the v3.x branch? This is a
semver-compatible update that eliminates the entire tar dependency chain.

Alternatively, a v3.x patch release that widens the onnxruntime-node peer/dep
range to include 1.22+ would let downstream consumers resolve it via overrides.

Impact

Any project using @huggingface/transformers@3.x triggers a high-severity
audit finding (bun audit, npm audit). The practical runtime risk is low
(tar is only used during onnxruntime-node's postinstall to extract native
binaries from Microsoft's CDN), but it blocks CI security gates and compliance
checks for downstream consumers.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions