Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6.
References
| Link | Resource |
|---|---|
| https://github.com/denoland/deno/releases/tag/v2.5.6 | Release Notes |
| https://github.com/denoland/deno/security/advisories/GHSA-m3c4-prhw-mrx6 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-15 23:15
Updated : 2026-01-21 14:32
NVD link : CVE-2026-22864
Mitre link : CVE-2026-22864
CVE.ORG link : CVE-2026-22864
JSON object : View
Products Affected
deno
- deno
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
