Turborepo is a high-performance build system for JavaScript and TypeScript codebases. From 1.1.0 to before 2.9.14, Turborepo can be vulnerable to arbitrary code execution when run in untrusted repositories that contain malicious Yarn configuration. In affected versions, package manager detection executed yarn --version from the project directory, which could cause Yarn to load and execute a project-controlled yarnPath from .yarnrc.yml. An attacker who controls repository contents could cause code execution when a user or CI system runs affected turbo, @turbo/codemod, or @turbo/workspace conversion commands. This vulnerability is fixed in 2.9.14.

Project Subscriptions

Vendors Products
Codemod Subscribe
Workspaces Subscribe
Turborepo Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3qcw-2rhx-2726 Turbo: Unexpected local code execution during Yarn Berry detection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:vercel:turborepo:*:*:*:*:*:node.js:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Sun, 17 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared @turbo
@turbo codemod
@turbo workspaces
Vercel
Vercel turborepo
Vendors & Products @turbo
@turbo codemod
@turbo workspaces
Vercel
Vercel turborepo

Sat, 16 May 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description Turborepo is a high-performance build system for JavaScript and TypeScript codebases. From 1.1.0 to before 2.9.14, Turborepo can be vulnerable to arbitrary code execution when run in untrusted repositories that contain malicious Yarn configuration. In affected versions, package manager detection executed yarn --version from the project directory, which could cause Yarn to load and execute a project-controlled yarnPath from .yarnrc.yml. An attacker who controls repository contents could cause code execution when a user or CI system runs affected turbo, @turbo/codemod, or @turbo/workspace conversion commands. This vulnerability is fixed in 2.9.14.
Title Turborepo: Unexpected local code execution during Yarn Berry detection
Weaknesses CWE-426
References
Metrics cvssV4_0

{'score': 0, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T17:54:06.401Z

Reserved: 2026-05-13T07:45:21.251Z

Link: CVE-2026-45772

cve-icon Vulnrichment

Updated: 2026-05-15T17:53:41.012Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-15T16:16:14.987

Modified: 2026-05-19T14:41:16.480

Link: CVE-2026-45772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T16:15:09Z

Weaknesses