Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m2gf-x3f6-8hq3 | Deno is Vulnerable to Command Injection on Windows During Batch File Execution |
Thu, 16 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
Wed, 08 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deno
Deno deno Microsoft Microsoft windows |
|
| Vendors & Products |
Deno
Deno deno Microsoft Microsoft windows |
Wed, 08 Oct 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue. | |
| Title | Deno is Vulnerable to Command Injection on Windows During Batch File Execution | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-08T18:51:09.772Z
Reserved: 2025-09-30T19:43:49.903Z
Link: CVE-2025-61787
Updated: 2025-10-08T18:49:14.928Z
Status : Analyzed
Published: 2025-10-08T02:15:41.897
Modified: 2025-10-16T18:14:53.107
Link: CVE-2025-61787
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:34:59Z
Github GHSA