


Perceptive Security
SOC/SIEM Consultancy

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill …
Published:
11 March 2026 at 23:00:00
Alert date:
12 March 2026 at 22:25:09
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A command injection vulnerability exists in Deno's node:child_process polyfill that bypasses a previous CVE fix. The vulnerability affects Deno versions 2.7.0 to 2.7.1 in shell mode. A priority bug in argument sanitization causes arguments with $VAR patterns to be wrapped in double quotes instead of single quotes. This allows backtick command substitution to execute, enabling arbitrary OS command execution. Attackers can bypass Deno's permission system by controlling arguments passed to spawnSync or spawn with shell: true. The vulnerability is fixed in version 2.7.2.
Technical details
Mitigation steps:
Affected products:
Deno
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32260
https://github.com/denoland/deno/security/advisories/GHSA-4c96-w8v2-p28j
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
