| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4c96-w8v2-p28j | Deno vulnerable to command Injection via incomplete shell metacharacter blocklist in node:child_process |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deno
Deno deno |
|
| Vendors & Products |
Deno
Deno deno |
Thu, 12 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument sanitization in transformDenoShellCommand (ext/node/polyfills/internal/child_process.ts) has a priority bug: when an argument contains a $VAR pattern, it is wrapped in double quotes (L1290) instead of single quotes. Double quotes in POSIX sh do not suppress backtick command substitution, allowing injected commands to execute. An attacker who controls arguments passed to spawnSync or spawn with shell: true can execute arbitrary OS commands, bypassing Deno's permission system. This vulnerability is fixed in 2.7.2. | |
| Title | Command Injection via incomplete shell metacharacter blocklist in node:child_process (bypass of CVE-2026-27190 fix) | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T16:13:40.538Z
Reserved: 2026-03-11T15:05:48.397Z
Link: CVE-2026-32260
Updated: 2026-03-13T16:13:36.966Z
Status : Awaiting Analysis
Published: 2026-03-12T20:16:06.020
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-32260
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:50:00Z
Github GHSA