| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6f6w-6j58-rq76 | Shescape has possible misidentification of shell due to link chains |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ericcornelissen
Ericcornelissen shescape |
|
| Vendors & Products |
Ericcornelissen
Ericcornelissen shescape |
|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Shescape is a simple shell escape library for JavaScript. Prior to 2.1.9, an attacker may be able to bypass escaping for the shell being used. This can result, for example, in exposure of sensitive information. This impacts users of Shescape that configure their shell to point to a file on disk that is a link to a link. The precise result of being affected depends on the actual shell used and incorrect shell identified by Shescape. This vulnerability is fixed in 2.1.9. | |
| Title | Shescape has possible misidentification of shell due to link chains | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-10T13:55:23.217Z
Reserved: 2026-03-07T16:40:05.884Z
Link: CVE-2026-30916
Updated: 2026-03-10T13:55:11.150Z
Status : Received
Published: 2026-03-10T17:40:15.363
Modified: 2026-03-10T18:18:51.930
Link: CVE-2026-30916
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:06:28Z
Github GHSA