Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 18 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Bun Trust Allow List Spoofing Allows Malicious Packages to Be Trusted |
Wed, 28 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bun
Bun bun |
|
| Vendors & Products |
Bun
Bun bun |
Tue, 27 Jan 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by a non-npm package in the case of a matching name (for file, link, git, or github). | |
| Weaknesses | CWE-348 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-28T21:19:54.515Z
Reserved: 2026-01-27T22:26:26.541Z
Link: CVE-2026-24910
Updated: 2026-01-28T21:19:49.038Z
Status : Deferred
Published: 2026-01-27T23:15:50.860
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24910
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:00:10Z