CVE-2026-45772
Published:May 15, 2026
Updated:May 18, 2026
Turborepo is a high-performance build system for JavaScript and TypeScript codebases. From 1.1.0 to before 2.9.14, Turborepo can be vulnerable to arbitrary code execution when run in untrusted repositories that contain malicious Yarn configuration. In affected versions, package manager detection executed yarn --version from the project directory, which could cause Yarn to load and execute a project-controlled yarnPath from .yarnrc.yml. An attacker who controls repository contents could cause code execution when a user or CI system runs affected turbo, @turbo/codemod, or @turbo/workspace conversion commands. This vulnerability is fixed in 2.9.14.
Affected Packages
https://github.com/vercel/turborepo.git (GITHUB):
Affected version(s) >=v1.1.0 <v2.9.14Fix Suggestion:
Update to version v2.9.14@turbo/codemod (NPM):
Affected version(s) >=2.3.4 <2.9.14Fix Suggestion:
Update to version 2.9.14turbo (NPM):
Affected version(s) >=1.1.0 <2.9.14Fix Suggestion:
Update to version 2.9.14@turbo/workspaces (NPM):
Affected version(s) >=2.3.4 <2.9.14Fix Suggestion:
Update to version 2.9.14Related Resources (1)
Do you need more information?
Contact UsWeakness Type (CWE)
Untrusted Search Path
EPSS
Base Score:
0.07