logo

CVE-2025-48888 deno_runtime

Package

Manager: cargo
Name: deno_runtime
Vulnerable Version: >=0.150.0 <0.212.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P

EPSS: 0.00048 pctl0.14553

Details

Deno run with --allow-read and --deny-read flags results in allowed ### Summary `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. Same with all global unary permissions given as `--allow-* --deny-*`. ### Details Caused by the fast exit logic in #22894. ### PoC Run the above command expecting no permissions to be passed. ### Impact This only affects a nonsensical combination of flags, so there shouldn't be a real impact on the userbase.

Metadata

Created: 2025-06-04T21:13:44Z
Modified: 2025-07-02T18:29:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-xqxc-x6p3-w683/GHSA-xqxc-x6p3-w683.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-xqxc-x6p3-w683
Finding: F006
Auto approve: 1