Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2phv-j68v-wwqx | pnpm vulnerable to Command Injection via environment variable substitution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 09 Jan 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pnpm
Pnpm pnpm |
|
| Vendors & Products |
Pnpm
Pnpm pnpm |
Thu, 08 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 07 Jan 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. An attacker who can control environment variables during pnpm operations could achieve Remote Code Execution (RCE) in build environments. This issue is fixed in version 10.27.0. | |
| Title | pnpm vulnerable to Command Injection via environment variable substitution | |
| Weaknesses | CWE-78 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-09T04:55:29.891Z
Reserved: 2025-12-30T19:12:56.184Z
Link: CVE-2025-69262
Updated: 2026-01-08T15:09:37.723Z
Status : Awaiting Analysis
Published: 2026-01-07T23:15:50.330
Modified: 2026-01-08T19:15:58.480
Link: CVE-2025-69262
OpenCVE Enrichment
Updated: 2026-01-08T09:48:16Z
Github GHSA