Skip to main content

CVE-2025-48935: CWE-863: Incorrect Authorization in denoland deno

Medium
VulnerabilityCVE-2025-48935cvecve-2025-48935cwe-863
Published: Wed Jun 04 2025 (06/04/2025, 19:31:26 UTC)
Source: CVE Database V5
Vendor/Project: denoland
Product: deno

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 07/07/2025, 02:42:16 UTC

Technical Analysis

CVE-2025-48935 is a medium-severity vulnerability affecting the Deno runtime, a secure JavaScript, TypeScript, and WebAssembly runtime environment. The vulnerability exists in versions 2.2.0 up to but not including 2.2.5. It involves an incorrect authorization flaw (CWE-863) that allows an attacker to bypass Deno's permission model specifically related to read/write database permissions. The issue arises from the ability to use the SQL `ATTACH DATABASE` statement to circumvent the permission checks that Deno enforces to restrict access to file system resources. This means that an attacker or malicious code running within Deno could potentially access or modify database files without having the appropriate permissions explicitly granted. The flaw does not require any privileges, user interaction, or authentication, and can be exploited remotely if the attacker can execute code within the Deno runtime environment. The vulnerability was patched in version 2.2.5 of Deno, which properly enforces permission checks to prevent unauthorized database attachment operations. The CVSS 4.0 base score is 5.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on integrity (partial). No known exploits are currently reported in the wild. This vulnerability highlights a critical aspect of Deno's security model, where permission enforcement is fundamental to its design, and bypassing it could lead to unauthorized data access or modification within applications using Deno for server-side or scripting purposes.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the extent to which Deno is used in their technology stacks, particularly in environments handling sensitive data or critical applications. Organizations using Deno to run backend services, APIs, or automation scripts that interact with databases could face unauthorized data access or modification risks if they run vulnerable versions. This could lead to data integrity issues, potential data leakage, or unauthorized data manipulation. Since Deno is often chosen for its security model, this vulnerability undermines that trust and could expose organizations to compliance risks, especially under GDPR where unauthorized data access must be prevented. The vulnerability could also be leveraged as part of a larger attack chain to escalate privileges or move laterally within a network if an attacker gains initial code execution. However, the medium severity and lack of known exploits suggest the immediate risk is moderate, but organizations should prioritize patching to maintain a strong security posture.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify all instances of Deno runtime in use, including development, testing, and production environments, with a focus on versions between 2.2.0 and 2.2.4 inclusive. 2) Upgrade all affected Deno installations to version 2.2.5 or later, which contains the patch that enforces proper permission checks on database attachment operations. 3) Review and audit permission configurations in Deno applications to ensure the principle of least privilege is applied, minimizing granted read/write permissions to only necessary resources. 4) Implement runtime monitoring and logging for database access operations within Deno applications to detect anomalous or unauthorized attachment attempts. 5) For environments where immediate patching is not feasible, consider restricting network access to Deno services and applying application-layer controls to limit execution of untrusted code. 6) Educate developers and DevOps teams about the importance of applying security patches promptly and verifying permission enforcement in Deno-based applications. 7) Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation if exploitation attempts occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-28T18:49:07.577Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6840c579182aa0cae2c16b11

Added to database: 6/4/2025, 10:15:21 PM

Last enriched: 7/7/2025, 2:42:16 AM

Last updated: 8/2/2025, 11:21:17 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats