Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m2gf-x3f6-8hq3 Deno is Vulnerable to Command Injection on Windows During Batch File Execution
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Deno
Deno deno
Microsoft
Microsoft windows
Vendors & Products Deno
Deno deno
Microsoft
Microsoft windows

Wed, 08 Oct 2025 01:45:00 +0000

Type Values Removed Values Added
Description Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.
Title Deno is Vulnerable to Command Injection on Windows During Batch File Execution
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-08T18:51:09.772Z

Reserved: 2025-09-30T19:43:49.903Z

Link: CVE-2025-61787

cve-icon Vulnrichment

Updated: 2025-10-08T18:49:14.928Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-08T02:15:41.897

Modified: 2025-10-08T19:38:09.863

Link: CVE-2025-61787

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:34:59Z