Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16912 | Deno run with --allow-read and --deny-read flags results in allowed |
Github GHSA |
GHSA-xqxc-x6p3-w683 | Deno run with --allow-read and --deny-read flags results in allowed |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Jul 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deno
Deno deno |
|
| CPEs | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Deno
Deno deno |
|
| Metrics |
cvssV3_1
|
Wed, 04 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. The result is the same with all global unary permissions given as `--allow-* --deny-*`. This only affects a nonsensical combination of flags, so there shouldn't be a real impact on the userbase. Users may upgrade to version 2.1.13, 2.2.13, or 2.3.2 to receive a patch. | |
| Title | Deno run with --allow-read and --deny-read flags results in allowed | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-04T19:32:53.261Z
Reserved: 2025-05-27T20:14:34.297Z
Link: CVE-2025-48888
Updated: 2025-06-04T19:31:43.733Z
Status : Analyzed
Published: 2025-06-04T20:15:23.977
Modified: 2025-07-02T14:05:20.353
Link: CVE-2025-48888
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA