CVE-2025-48888Incorrect Authorization in Deno

Severity
5.5MEDIUMNVD
EPSS
0.3%
top 50.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 4

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. The result is the same with all global unary permissions given as `--allow-* --deny-*`. This only affects a nonsensical combination of flags, so there shouldn't be a real impact on the userbase. Users may upgrade to version 2.1.13, 2.2.13, or 2.3.2 to receive a

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

crates.iodeno/deno_runtime0.150.00.212.0
NVDdeno/deno1.41.32.1.13+2
crates.iodeno/deno1.41.32.1.13+2
CVEListV5denoland/deno>= 1.41.3, < 2.1.13, >= 2.2.0, < 2.2.13, >= 2.3.0, < 2.3.2+2

Patches

🔴Vulnerability Details

2
GHSA
Deno run with --allow-read and --deny-read flags results in allowed2025-06-04
OSV
Deno run with --allow-read and --deny-read flags results in allowed2025-06-04