top of page
perceptive_background_267k.jpg

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill …

Published:

11 maart 2026 om 23:00:00

Alert date:

12 maart 2026 om 22:25:09

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A command injection vulnerability exists in Deno's node:child_process polyfill that bypasses a previous CVE fix. The vulnerability affects Deno versions 2.7.0 to 2.7.1 in shell mode. A priority bug in argument sanitization causes arguments with $VAR patterns to be wrapped in double quotes instead of single quotes. This allows backtick command substitution to execute, enabling arbitrary OS command execution. Attackers can bypass Deno's permission system by controlling arguments passed to spawnSync or spawn with shell: true. The vulnerability is fixed in version 2.7.2.

Technical details

Mitigation steps:

Affected products:

Deno

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page