Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m3c4-prhw-mrx6 | Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass |
Wed, 21 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* |
Fri, 16 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deno
Deno deno |
|
| Vendors & Products |
Deno
Deno deno |
Thu, 15 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6. | |
| Title | Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T17:16:02.143Z
Reserved: 2026-01-12T16:20:16.746Z
Link: CVE-2026-22864
Updated: 2026-01-16T17:15:51.216Z
Status : Analyzed
Published: 2026-01-15T23:15:51.937
Modified: 2026-01-21T14:32:39.837
Link: CVE-2026-22864
No data.
OpenCVE Enrichment
Updated: 2026-04-18T06:00:08Z
Github GHSA