top of page
perceptive_background_267k.jpg

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill …

Published:

11 March 2026 at 23:00:00

Alert date:

12 March 2026 at 22:25:09

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A command injection vulnerability exists in Deno's node:child_process polyfill that bypasses a previous CVE fix. The vulnerability affects Deno versions 2.7.0 to 2.7.1 in shell mode. A priority bug in argument sanitization causes arguments with $VAR patterns to be wrapped in double quotes instead of single quotes. This allows backtick command substitution to execute, enabling arbitrary OS command execution. Attackers can bypass Deno's permission system by controlling arguments passed to spawnSync or spawn with shell: true. The vulnerability is fixed in version 2.7.2.

Technical details

Mitigation steps:

Affected products:

Deno

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page