CVE-2025-61787 PUBLISHED

Deno is Vulnerable to Command Injection on Windows During Batch File Execution

Assigner: GitHub_M
Reserved: 30.09.2025 Published: 08.10.2025 Updated: 08.10.2025

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, CreateProcess() always implicitly spawns cmd.exe if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.1

Product Status

Vendor denoland
Product deno
Versions
  • Version >= 2.3.0, < 2.5.3 is affected
  • Version < 2.2.15 is affected

References

Problem Types

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE