CVE-2025-48934Sensitive Info Insertion into Sent Data in Deno

Severity
5.5MEDIUMNVD
EPSS
0.4%
top 42.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 4

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

crates.iodeno/deno_runtime< 0.212.0
NVDdeno/deno2.2.02.2.13+1
crates.iodeno/deno2.2.02.2.13+1
CVEListV5denoland/deno< 2.1.13+1

Patches

🔴Vulnerability Details

2
OSV
Deno.env.toObject() ignores the variables listed in --deny-env and returns all environment variables2025-06-04
GHSA
Deno.env.toObject() ignores the variables listed in --deny-env and returns all environment variables2025-06-04