Anonymous Intelligence Signal

pnpm v10 Update Addresses Critical Global Cache Poisoning Vulnerability (CVE-2024-53866)

human The Lab unverified 2026-04-11 09:22:29 Source: GitHub Issues

A major update to the pnpm package manager addresses a critical security flaw that could allow attackers to poison the global cache and bypass script execution safeguards. The vulnerability, tracked as CVE-2024-53866 (GHSA-vm32-9rqf-rh3r), stems from a mishandling of workspace overrides and npm metadata, creating a vector for supply chain attacks. This flaw specifically enables an 'ignore-scripts' evasion, potentially allowing malicious code to execute during installation even when users believe they have disabled script execution.

The core of the issue lies in how pnpm processes overrides—configuration settings that allow developers to force specific package versions. According to the advisory, overrides from one workspace can leak into the npm metadata saved in the global cache. This leakage corrupts the shared cache, meaning a malicious or compromised package in one project could taint the cache and affect other, unrelated projects on the same system. The update from version 9.14.2 to 10.28.2 patches this vulnerability, closing a significant security gap in a tool used by millions of developers worldwide.

The fix is critical for any organization or developer relying on pnpm for JavaScript and Node.js project management. The vulnerability highlights the persistent risks within software supply chains, where a single tool's flaw can have cascading security implications. While the patch is now available, the incident underscores the need for rigorous dependency management and prompt updates, as cached metadata can become an unexpected attack surface. Developers are urged to update to pnpm v10.28.2 immediately to mitigate this cache poisoning risk.