Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/denoland/deno/commit/31a97803995bd94629528ba841b2418d3ca01860 | Patch |
https://github.com/denoland/deno/security/advisories/GHSA-8vxj-4cph-c596 | Exploit Vendor Advisory |
Configurations
History
02 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Deno deno
Deno |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | () https://github.com/denoland/deno/commit/31a97803995bd94629528ba841b2418d3ca01860 - Patch | |
References | () https://github.com/denoland/deno/security/advisories/GHSA-8vxj-4cph-c596 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* |
05 Jun 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-04 20:15
Updated : 2025-07-02 13:17
NVD link : CVE-2025-48935
Mitre link : CVE-2025-48935
CVE.ORG link : CVE-2025-48935
JSON object : View
Products Affected
deno
- deno
CWE
CWE-863
Incorrect Authorization