Denoland Deno vulnerabilities

27 known vulnerabilities affecting denoland/deno.

Total CVEs
27
CISA KEV
0
Public exploits
0
Exploited in wild
1
Severity breakdown
CRITICAL8HIGH9MEDIUM8LOW2

Vulnerabilities

Page 1 of 2
CVE-2026-27190CRITICALCVSS 9.8v>= 2.7.0, < 2.7.22026-02-20
CVE-2026-27190 [CRITICAL] CWE-78 CVE-2026-27190: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulne Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.
nvd
CVE-2026-22864CRITICALCVSS 9.8fixed in 2.5.62026-01-15
CVE-2026-22864 [CRITICAL] CWE-77 CVE-2026-22864: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to bloc Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternat
nvd
CVE-2026-22863CRITICALCVSS 9.2fixed in 2.6.02026-01-15
CVE-2026-22863 [CRITICAL] CWE-325 CVE-2026-22863: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finaliz Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finalize cipher. The vulnerability allows an attacker to have infinite encryptions. This can lead to naive attempts at brute forcing, as well as more refined attacks with the goal to learn the server secrets. This vulnerability is fixed in 2.6.0.
nvd
CVE-2025-61787HIGHCVSS 8.1v>= 2.3.0, < 2.5.3fixed in 2.2.152025-10-08
CVE-2025-61787 [HIGH] CWE-77 CVE-2025-61787: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vu Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via
nvd
CVE-2025-61786LOWCVSS 3.3v>= 2.3.0, < 2.5.3fixed in 2.2.152025-10-08
CVE-2025-61786 [LOW] CWE-269 CVE-2025-61786: Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `D Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--d
nvd
CVE-2025-61785LOWCVSS 3.3v>= 2.3.0, < 2.5.3fixed in 2.2.152025-10-08
CVE-2025-61785 [LOW] CWE-266 CVE-2025-61785: Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `D Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even wh
nvd
CVE-2025-48935MEDIUMCVSS 5.5v>= 2.2.0, < 2.2.52025-06-04
CVE-2025-48935 [MEDIUM] CWE-863 CVE-2025-48935: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to ve Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a patch for the issue.
nvd
CVE-2025-48934MEDIUMCVSS 5.5fixed in 2.1.13v>= 2.2.0, < 2.2.132025-06-04
CVE-2025-48934 [MEDIUM] CWE-201 CVE-2025-48934: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are imp
nvd
CVE-2025-48888MEDIUMCVSS 5.5v>= 1.41.3, < 2.1.13v>= 2.2.0, < 2.2.13+1 more2025-06-04
CVE-2025-48888 [MEDIUM] CWE-863 CVE-2025-48888: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to v Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. The result is the same with all global unary permissions given as `--allow-* --deny-*`. This only affects a nonse
nvd
CVE-2025-24015HIGHCVSS 7.7v>= 1.46.0, < 2.1.72025-06-03
CVE-2025-24015 [HIGH] CWE-347 CVE-2025-24015: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an iss Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Den
nvd
CVE-2025-21620HIGHCVSS 7.5fixed in 2.1.22025-01-06
CVE-2025-21620 [HIGH] CWE-200 CVE-2025-21620: Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a requ Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that seco
nvd
CVE-2024-32468MEDIUMCVSS 5.4vdeno_doc: < 0.119.0vdeno: < 1.42.02024-11-25
CVE-2024-32468 [MEDIUM] CWE-79 CVE-2024-32468: Deno is a runtime for JavaScript and TypeScript written in rust. Several cross-site scripting vulner Deno is a runtime for JavaScript and TypeScript written in rust. Several cross-site scripting vulnerabilities existed in the `deno_doc` crate which lead to Self-XSS with deno doc --html. 1.) XSS in generated `search_index.js`, `deno_doc` outputs a JavaScript file for searching. However, the generated file used `innerHTML` on unsanitzed HTML input. 2.
nvd
CVE-2024-37150MEDIUMCVSS 6.5v= 1.44.02024-06-06
CVE-2024-37150 [MEDIUM] CWE-200 CVE-2024-37150: An issue in `.npmrc` support in Deno 1.44.0 was discovered where Deno would send `.npmrc` credential An issue in `.npmrc` support in Deno 1.44.0 was discovered where Deno would send `.npmrc` credentials for the scope to the tarball URL when the registry provided URLs for a tarball on a different domain. All users relying on .npmrc are potentially affected by this vulnerability if their private registry references tarball URLs at a different domain.
nvd
CVE-2024-34346CRITICALCVSS 9.0fixed in 1.43.02024-05-07
CVE-2024-34346 [CRITICAL] CWE-863 CVE-2024-34346: Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. The Deno sandbox may Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. The Deno sandbox may be unexpectedly weakened by allowing file read/write access to privileged files in various locations on Unix and Windows platforms. For example, reading `/proc/self/environ` may provide access equivalent to `--allow-env`, and writing `/proc/self/me
nvd
CVE-2024-32477HIGHCVSS 7.4fixed in 1.42.22024-04-18
CVE-2024-32477 [HIGH] CWE-78 CVE-2024-32477: Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between `libc::tcflush(0, libc::TCIFLUSH)` and reading standard input, it's possible to manipulate the permission prompt and force it to allow an unsafe action regardless of the user input. Some ANSI escape sequences act as a info r
nvd
CVE-2024-27934HIGHCVSS 8.8v>= 1.36.2, < 1.40.32024-03-21
CVE-2024-27934 [HIGH] CWE-416 CVE-2024-27934: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to v Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.36.2 and prior to version 1.40.3, use of inherently unsafe `*const c_void` and `ExternalPointer` leads to use-after-free access of the underlying structure, resulting in arbitrary code execution. Use of inherently unsafe `*const c_void` and `ExternalPointer` leads to use-
nvd
CVE-2024-27935HIGHCVSS 8.3v>= 1.35.1, < 1.36.32024-03-21
CVE-2024-27935 [HIGH] CWE-488 CVE-2024-27935: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to v Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue arises from the re-use of a global bu
nvd
CVE-2024-27933HIGHCVSS 8.8v= 1.39.02024-03-21
CVE-2024-27933 [HIGH] CWE-863 CVE-2024-27933: Deno is a JavaScript, TypeScript, and WebAssembly runtime. In version 1.39.0, use of raw file descri Deno is a JavaScript, TypeScript, and WebAssembly runtime. In version 1.39.0, use of raw file descriptors in `op_node_ipc_pipe()` leads to premature close of arbitrary file descriptors, allowing standard input to be re-opened as a different resource resulting in permission prompt bypass. Node child_process IPC relies on the JS side to pass the raw IPC
nvd
CVE-2024-27932MEDIUMCVSS 4.6v>= 1.8.0, < 1.40.42024-03-21
CVE-2024-27932 [MEDIUM] CWE-20 CVE-2024-27932: Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to ve Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `no
nvd
CVE-2024-27936MEDIUMCVSS 6.5v>= 1.32.1, < 1.41.02024-03-21
CVE-2024-27936 [MEDIUM] CWE-150 CVE-2024-27936: Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from
nvd