CVE-2025-61786: CWE-269: Improper Privilege Management in denoland deno
Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
AI Analysis
Technical Summary
Deno is a secure runtime for JavaScript, TypeScript, and WebAssembly that enforces a permission model to restrict file system access. In affected versions prior to 2.5.3 and 2.2.15, the methods Deno.FsFile.prototype.stat and statSync do not properly enforce the --deny-read permission flag. While APIs like Deno.stat and statSync require explicit allow-read permission, these prototype methods can be called on file handles opened with write-only flags, bypassing the read restriction and allowing retrieval of file metadata such as size, modification time, and permissions. This flaw constitutes an improper privilege management vulnerability (CWE-269) because it violates the intended access control policy. The vulnerability is limited to information disclosure of file metadata, not file contents, and requires the attacker to have some level of local code execution with limited read privileges. The issue was identified and patched in versions 2.5.3 and 2.2.15, closing the permission bypass. No public exploits have been reported, indicating low active threat but potential risk in environments relying on strict permission enforcement.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of file metadata, which may aid attackers in reconnaissance or in crafting further attacks by revealing file existence, sizes, and modification times. Although it does not expose file contents, metadata can still leak sensitive operational information or system structure. Organizations using Deno in development, CI/CD pipelines, or serverless environments where scripts run with restricted permissions are at risk. This could impact confidentiality and potentially facilitate privilege escalation or lateral movement if combined with other vulnerabilities. The low CVSS score reflects limited impact and exploitation complexity, but the risk is higher in sensitive environments or where Deno is used in multi-tenant or shared infrastructure common in European cloud deployments.
Mitigation Recommendations
European organizations should immediately upgrade all Deno runtime instances to versions 2.5.3 or 2.2.15 or later to remediate this vulnerability. Review and audit permission configurations in Deno scripts to ensure the principle of least privilege is enforced. Avoid opening files with write-only flags if file metadata access is not required. Implement runtime monitoring to detect anomalous use of file stat APIs. In environments where upgrading is delayed, consider restricting execution of untrusted or third-party Deno scripts and isolate Deno workloads to minimize potential impact. Incorporate this vulnerability into vulnerability management and patching workflows, and educate developers on secure use of Deno’s permission model.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-61786: CWE-269: Improper Privilege Management in denoland deno
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
AI-Powered Analysis
Technical Analysis
Deno is a secure runtime for JavaScript, TypeScript, and WebAssembly that enforces a permission model to restrict file system access. In affected versions prior to 2.5.3 and 2.2.15, the methods Deno.FsFile.prototype.stat and statSync do not properly enforce the --deny-read permission flag. While APIs like Deno.stat and statSync require explicit allow-read permission, these prototype methods can be called on file handles opened with write-only flags, bypassing the read restriction and allowing retrieval of file metadata such as size, modification time, and permissions. This flaw constitutes an improper privilege management vulnerability (CWE-269) because it violates the intended access control policy. The vulnerability is limited to information disclosure of file metadata, not file contents, and requires the attacker to have some level of local code execution with limited read privileges. The issue was identified and patched in versions 2.5.3 and 2.2.15, closing the permission bypass. No public exploits have been reported, indicating low active threat but potential risk in environments relying on strict permission enforcement.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of file metadata, which may aid attackers in reconnaissance or in crafting further attacks by revealing file existence, sizes, and modification times. Although it does not expose file contents, metadata can still leak sensitive operational information or system structure. Organizations using Deno in development, CI/CD pipelines, or serverless environments where scripts run with restricted permissions are at risk. This could impact confidentiality and potentially facilitate privilege escalation or lateral movement if combined with other vulnerabilities. The low CVSS score reflects limited impact and exploitation complexity, but the risk is higher in sensitive environments or where Deno is used in multi-tenant or shared infrastructure common in European cloud deployments.
Mitigation Recommendations
European organizations should immediately upgrade all Deno runtime instances to versions 2.5.3 or 2.2.15 or later to remediate this vulnerability. Review and audit permission configurations in Deno scripts to ensure the principle of least privilege is enforced. Avoid opening files with write-only flags if file metadata access is not required. Implement runtime monitoring to detect anomalous use of file stat APIs. In environments where upgrading is delayed, consider restricting execution of untrusted or third-party Deno scripts and isolate Deno workloads to minimize potential impact. Incorporate this vulnerability into vulnerability management and patching workflows, and educate developers on secure use of Deno’s permission model.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-30T19:43:49.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e5b7a8a677756fc9ab1387
Added to database: 10/8/2025, 1:00:24 AM
Last enriched: 10/8/2025, 1:15:22 AM
Last updated: 10/8/2025, 10:56:27 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11509: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-11508: Unrestricted Upload in code-projects Voting System
MediumCVE-2025-11535: CWE-276 Incorrect Default Permissions in MongoDB Inc MongoDB Connector for BI
HighCVE-2025-11507: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-11506: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.