CVE-2025-61787
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-08

Last updated on: 2025-10-16

Assigner: GitHub, Inc.

Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-08
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
deno deno to 2.2.15 (inc)
deno deno From 2.3.0 (inc) to 2.5.3 (exc)
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Deno versions prior to 2.5.3 and 2.2.15 on Windows. When batch files (.bat, .cmd, etc.) are executed, Windows' CreateProcess() function implicitly spawns cmd.exe, even if not specified. This behavior allows an attacker to perform command line injection attacks, potentially executing arbitrary commands through Deno.


How can this vulnerability impact me? :

The vulnerability can lead to an attacker executing arbitrary commands on a Windows system running vulnerable versions of Deno. This can result in full compromise of confidentiality, integrity, and availability of the affected system, as indicated by the high CVSS score (8.1) with high impact on confidentiality, integrity, and availability.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Deno to version 2.5.3 or later (for the 2.5.x branch) or 2.2.15 or later (for the 2.2.x branch) to fix the command line injection vulnerability on Windows.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart