CVE-2026-22864Command Injection in Deno

CWE-77Command Injection4 documents4 sources
Severity
9.8CRITICALNVD
GHSA8.1OSV8.1
EPSS
0.0%
top 91.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 15
Latest updateJan 16

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDdeno/deno< 2.5.6
crates.iodeno/deno< 2.5.6
CVEListV5denoland/deno< 2.5.6

🔴Vulnerability Details

2
OSV
Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass2026-01-16
GHSA
Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass2026-01-16

🕵️Threat Intelligence

1
Wiz
CVE-2026-22864 Impact, Exploitability, and Mitigation Steps | Wiz