Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.
References
Configurations
History
02 Jul 2025, 13:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Deno deno
Deno |
|
References | () https://docs.deno.com/api/deno/~/Deno.Env.toObject - Product | |
References | () https://docs.deno.com/runtime/fundamentals/security/#environment-variables - Product | |
References | () https://github.com/denoland/deno/commit/2959e083912420988066a001c2b2d6732a1b562f - Patch | |
References | () https://github.com/denoland/deno/commit/946ccda1aa19a00c478a5e6826b75053b050d753 - Patch | |
References | () https://github.com/denoland/deno/pull/29079 - Issue Tracking, Patch | |
References | () https://github.com/denoland/deno/security/advisories/GHSA-7w8p-chxq-2789 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
05 Jun 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-04 20:15
Updated : 2025-07-02 13:43
NVD link : CVE-2025-48934
Mitre link : CVE-2025-48934
CVE.ORG link : CVE-2025-48934
JSON object : View
Products Affected
deno
- deno
CWE
CWE-201
Insertion of Sensitive Information Into Sent Data