The vulnerability described in CVE-2025-69874 is a path traversal issue within the nanotar library, specifically affecting the parseTar and parseTarGzip functions. The advisory indicates that all versions up to and including 0.2.0 are vulnerable, and no patch is currently available. My analysis of the source code from the unjs/nanotar repository confirms this. The core of the issue lies in the parseTar function located in src/parse.ts. This function is responsible for parsing tar archive data. It extracts file names from the tar headers but critically fails to perform any sanitization or validation on these names. As a result, file names containing path traversal sequences like ../ are processed and returned to the calling application as-is. If the application then uses these file names to write files to the disk, it becomes vulnerable to an attack where a specially crafted tar archive can write files outside of the intended extraction directory. The parseTarGzip function is also vulnerable as it is a simple wrapper that first decompresses the input data and then passes it to the parseTar function, thereby inheriting the same vulnerability. Since the latest code on the main branch does not contain any fixes for this issue, the vulnerability remains unpatched.