Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vg2r-rmgp-cgqj | Deno's --deny-write check does not prevent permission bypass |
Thu, 16 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 08 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deno
Deno deno |
|
| Vendors & Products |
Deno
Deno deno |
Wed, 08 Oct 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even when the file is opened with `read` only permission (and `write`: `false`) and file write operations are not allowed (the script is executed with `--deny-write=./`). Similar APIs like `Deno.utime` and `Deno.utimeSync` require `allow-write` permission, however, when a file is opened, even with read only flags and deny-write permission, it's still possible to change the access (`atime`) and modification (`mtime`) times, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue. | |
| Title | Deno's --deny-write check does not prevent permission bypass | |
| Weaknesses | CWE-266 | |
| References |
|
|
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-08T18:59:12.863Z
Reserved: 2025-09-30T19:43:49.902Z
Link: CVE-2025-61785
Updated: 2025-10-08T18:59:06.371Z
Status : Analyzed
Published: 2025-10-08T01:15:32.847
Modified: 2025-10-16T18:12:40.397
Link: CVE-2025-61785
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:35:03Z
Github GHSA