pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. This allows the remote server to serve different content on each install, even when a lockfile is committed. An attacker who publishes a package with an HTTP tarball dependency can serve different code to different users or CI/CD environments. The attack requires the victim to install a package that has an HTTP/git tarball in its dependency tree. The victim's lockfile provides no protection. This issue is fixed in version 10.26.0.
History

Thu, 08 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Pnpm
Pnpm pnpm
Vendors & Products Pnpm
Pnpm pnpm

Wed, 07 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. This allows the remote server to serve different content on each install, even when a lockfile is committed. An attacker who publishes a package with an HTTP tarball dependency can serve different code to different users or CI/CD environments. The attack requires the victim to install a package that has an HTTP/git tarball in its dependency tree. The victim's lockfile provides no protection. This issue is fixed in version 10.26.0.
Title pnpm Lockfile Integrity Bypass Allows Remote Dynamic Dependencies
Weaknesses CWE-494
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-09T04:55:26.728Z

Reserved: 2025-12-30T19:36:06.780Z

Link: CVE-2025-69263

cve-icon Vulnrichment

Updated: 2026-01-07T21:40:15.979Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-07T22:15:43.727

Modified: 2026-01-08T18:08:54.147

Link: CVE-2025-69263

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-07T21:31:07Z

Links: CVE-2025-69263 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-01-08T09:48:01Z