Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61785: CWE-266: Incorrect Privilege Assignment in denoland deno

0
Low
VulnerabilityCVE-2025-61785cvecve-2025-61785cwe-266
Published: Wed Oct 08 2025 (10/08/2025, 00:37:01 UTC)
Source: CVE Database V5
Vendor/Project: denoland
Product: deno

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even when the file is opened with `read` only permission (and `write`: `false`) and file write operations are not allowed (the script is executed with `--deny-write=./`). Similar APIs like `Deno.utime` and `Deno.utimeSync` require `allow-write` permission, however, when a file is opened, even with read only flags and deny-write permission, it's still possible to change the access (`atime`) and modification (`mtime`) times, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.

AI-Powered Analysis

AILast updated: 10/08/2025, 01:15:37 UTC

Technical Analysis

CVE-2025-61785 is a vulnerability identified in the Deno runtime environment, which supports JavaScript, TypeScript, and WebAssembly execution. The issue arises from incorrect privilege assignment related to file timestamp modification APIs. Specifically, the methods Deno.FsFile.prototype.utime and utimeSync allow changing the access time (atime) and modification time (mtime) of a file stream resource even when the file is opened with read-only permissions and the runtime is executed with the --deny-write=./ flag, which is intended to prevent any write operations. This bypass occurs because these methods do not enforce the permission model correctly, unlike other similar APIs such as Deno.utime and Deno.utimeSync, which require explicit allow-write permissions. The vulnerability affects Deno versions >= 2.3.0 and < 2.5.3, and versions prior to 2.2.15. The flaw allows an attacker or script with limited privileges to alter file timestamps without write permissions, potentially undermining file integrity and audit mechanisms that rely on accurate metadata. However, the vulnerability does not allow modification of file contents or deletion, limiting its impact. The issue was publicly disclosed on October 8, 2025, with no known exploits in the wild. The fix was implemented in versions 2.5.3 and 2.2.15 by enforcing proper permission checks on these APIs. The CVSS v3.0 score is 3.3, reflecting low severity due to local attack vector, low impact on integrity, and no impact on confidentiality or availability.

Potential Impact

For European organizations, the primary impact of CVE-2025-61785 lies in the potential manipulation of file metadata, specifically access and modification timestamps, without proper write permissions. This can undermine the integrity of file audit trails, compliance logs, and forensic investigations that rely on accurate timestamps to detect unauthorized changes or access patterns. Organizations using Deno in development, continuous integration pipelines, or production environments where file integrity and auditability are critical may face challenges in trustworthiness of file metadata. While the vulnerability does not permit direct modification of file content or deletion, altering timestamps could be leveraged in sophisticated attack scenarios to obfuscate malicious activity or evade detection. The low CVSS score and lack of known exploits suggest limited immediate risk, but the vulnerability could be exploited in targeted attacks where timestamp manipulation aids in stealth. European sectors with stringent compliance requirements, such as finance, healthcare, and government, may be particularly sensitive to such integrity issues. Additionally, organizations relying on automated monitoring tools that track file changes might experience false negatives or misinterpretations if timestamps are tampered with.

Mitigation Recommendations

1. Upgrade all Deno runtime environments to version 2.5.3 or later, or 2.2.15 or later, where the vulnerability is patched. 2. Audit existing scripts and applications that use Deno.FsFile.prototype.utime and utimeSync APIs to identify and remediate any unauthorized or unnecessary usage. 3. Implement strict code review and permission management policies to ensure scripts do not run with excessive privileges, especially avoiding unnecessary file system access. 4. Enhance monitoring and alerting on file metadata changes, correlating timestamp modifications with other system events to detect suspicious activity. 5. Use file integrity monitoring solutions that verify not only file contents but also metadata consistency to detect unauthorized timestamp changes. 6. Educate developers and DevOps teams about the importance of permission enforcement in Deno and encourage adoption of secure coding practices. 7. Consider isolating or sandboxing Deno runtime environments where possible to limit the scope of potential misuse. 8. Maintain an inventory of Deno versions deployed across the organization to ensure timely patching and vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-30T19:43:49.902Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68e5b7a8a677756fc9ab1380

Added to database: 10/8/2025, 1:00:24 AM

Last enriched: 10/8/2025, 1:15:37 AM

Last updated: 10/8/2025, 10:54:24 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats