CVE-2025-61787Command Injection in Deno

CWE-77Command Injection5 documents3 sources
Severity
8.1HIGHNVD
EPSS
0.1%
top 68.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 8
Latest updateJan 16

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

NVDdeno/deno2.3.02.5.3+1
crates.iodeno/deno< 2.5.6+1
CVEListV5denoland/deno< 2.2.15+1

Patches

🔴Vulnerability Details

4
OSV
Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass2026-01-16
GHSA
Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass2026-01-16
GHSA
Deno is Vulnerable to Command Injection on Windows During Batch File Execution2025-10-08
OSV
Deno is Vulnerable to Command Injection on Windows During Batch File Execution2025-10-08