CVE-2025-48934

MEDIUM

Deno <2.1.13, 2.2.13 - Info Disclosure

Title source: llm
STIX 2.1

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.

Scores

CVSS v3 5.3
EPSS 0.0035
EPSS Percentile 57.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-201
Status published
Products (3)
crates.io/deno 0 - 2.1.13crates.io
crates.io/deno_runtime 0 - 0.212.0crates.io
deno/deno < 2.1.13
Published Jun 04, 2025
Tracked Since Feb 18, 2026