-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Description
Summary
@huggingface/transformers@3.8.1 depends on onnxruntime-node@1.21.0, which
depends on tar@^7.0.1. This exposes downstream consumers to
CVE-2026-26960 (High 7.1 —
arbitrary file read/write via hardlink target escape through symlink chain).
Dependency chain
@huggingface/transformers@3.8.1
└── onnxruntime-node@1.21.0
└── tar@^7.0.1 (resolved ≤7.5.7, vulnerable)
Fix available upstream
tarfixed the vulnerability in 7.5.8 (current: 7.5.9).onnxruntime-noderemovedtarentirely in v1.22.0, switching to
adm-zip. Current latest is 1.24.2.@huggingface/transformersv4.0.0-next already uses onnxruntime-node@1.24.1,
so this is resolved in v4 preview but not in stable v3.
Request
Could onnxruntime-node be bumped to >=1.22.0 in the v3.x branch? This is a
semver-compatible update that eliminates the entire tar dependency chain.
Alternatively, a v3.x patch release that widens the onnxruntime-node peer/dep
range to include 1.22+ would let downstream consumers resolve it via overrides.
Impact
Any project using @huggingface/transformers@3.x triggers a high-severity
audit finding (bun audit, npm audit). The practical runtime risk is low
(tar is only used during onnxruntime-node's postinstall to extract native
binaries from Microsoft's CDN), but it blocks CI security gates and compliance
checks for downstream consumers.