CVE-2026-1665

MEDIUM

nvm <0.40.3 - Command Injection

Title source: llm
STIX 2.1

Description

A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path). An attacker who can set environment variables in a victim's shell environment (e.g., via malicious CI/CD configurations, compromised dotfiles, or Docker images) can inject arbitrary shell commands that execute when the victim runs nvm commands that trigger downloads, such as 'nvm install' or 'nvm ls-remote'.

Scores

CVSS v4 5.4
EPSS 0.0003
EPSS Percentile 9.5%
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78 CWE-95
Status published
Products (2)
nvm-sh/nvm 0.40.0 - 0.40.3
nvm-sh/nvm 0.40.4
Published Jan 29, 2026
Tracked Since Feb 18, 2026