Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.41.3 and prior to versions 2.1.13, 2.2.13, and 2.3.2, `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. The result is the same with all global unary permissions given as `--allow-* --deny-*`. This only affects a nonsensical combination of flags, so there shouldn't be a real impact on the userbase. Users may upgrade to version 2.1.13, 2.2.13, or 2.3.2 to receive a patch.
References (6)
Core 6
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/denoland/deno/security/advisories/GHSA-xqxc-x6p3-w683
Issue Tracking, Patch x_refsource_misc
https://github.com/denoland/deno/pull/22894
Issue Tracking, Patch x_refsource_misc
https://github.com/denoland/deno/pull/29213
Patch x_refsource_misc
https://github.com/denoland/deno/commit/2f0fae9d9071dcaf0a689bc7097584b1b9ebc8db
Patch x_refsource_misc
https://github.com/denoland/deno/commit/9d665572d3cd39f997e29e6daac7c1102fc5c04f
Patch x_refsource_misc
https://github.com/denoland/deno/commit/ef315b56c26c9ef5f25284a5100d2ed525a148cf
Scores
CVSS v3
5.3
EPSS
0.0026
EPSS Percentile
49.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-863
Status
published
Products (3)
crates.io/deno
1.41.3 - 2.1.13crates.io
crates.io/deno_runtime
0.150.0 - 0.212.0crates.io
deno/deno
1.41.3 - 2.1.13
Published
Jun 04, 2025
Tracked Since
Feb 18, 2026