CVE-2025-24959 – zx
Package
Manager: npm
Name: zx
Vulnerable Version: =8.3.1 || >=8.3.1 <8.3.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00092 pctl0.26818
Details
ZX Allows Environment Variable Injection for dotenv API ### Impact This vulnerability is an **Environment Variable Injection** issue in `dotenv.stringify`, affecting `google/zx` version **8.3.1**. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to **arbitrary command execution** or **unexpected behavior** in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. ### Patches This issue has been **patched** in version **8.3.2**. Users should **immediately upgrade** to this version to mitigate the vulnerability. ### Workarounds If upgrading is not feasible, users can mitigate the vulnerability by **sanitizing user-controlled environment variable values** before passing them to `dotenv.stringify`. Specifically, avoid using `"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage. ### References - [Issue Report](https://github.com/google/zx/issues/) - [Security Policy](https://github.com/google/zx/security/policy) - [Google Vulnerability Disclosure](https://g.co/vulnz) - [Patch](https://github.com/google/zx/pull/1094)
Metadata
Created: 2025-02-03T22:34:08Z
Modified: 2025-02-04T17:29:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-qwp8-x4ff-5h87/GHSA-qwp8-x4ff-5h87.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-qwp8-x4ff-5h87
Finding: F184
Auto approve: 1