CVE-2025-48934

Name
CVE-2025-48934
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://docs.deno.com/api/deno/~/Deno.Env.toObject
MISC https://docs.deno.com/runtime/fundamentals/security/#environment-variables
MISC https://github.com/denoland/deno/commit/2959e083912420988066a001c2b2d6732a1b562f
MISC https://github.com/denoland/deno/commit/946ccda1aa19a00c478a5e6826b75053b050d753
MISC https://github.com/denoland/deno/pull/29079
CONFIRM https://github.com/denoland/deno/security/advisories/GHSA-7w8p-chxq-2789

Match rules

CPE URI Source package Min version Max version
deno >= 0 < 2.1.13
deno >= 2.2.0 < 2.2.13
cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* deno >= None < 2.1.13

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
deno edge-community 2.0.6-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
deno edge-community 2.0.6-r2 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
deno 3.22-community 2.0.6-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable