Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61786: CWE-269: Improper Privilege Management in denoland deno

0
Low
VulnerabilityCVE-2025-61786cvecve-2025-61786cwe-269
Published: Wed Oct 08 2025 (10/08/2025, 00:49:42 UTC)
Source: CVE Database V5
Vendor/Project: denoland
Product: deno

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.

AI-Powered Analysis

AILast updated: 10/08/2025, 01:15:22 UTC

Technical Analysis

Deno is a secure runtime for JavaScript, TypeScript, and WebAssembly that enforces a permission model to restrict file system access. In affected versions prior to 2.5.3 and 2.2.15, the methods Deno.FsFile.prototype.stat and statSync do not properly enforce the --deny-read permission flag. While APIs like Deno.stat and statSync require explicit allow-read permission, these prototype methods can be called on file handles opened with write-only flags, bypassing the read restriction and allowing retrieval of file metadata such as size, modification time, and permissions. This flaw constitutes an improper privilege management vulnerability (CWE-269) because it violates the intended access control policy. The vulnerability is limited to information disclosure of file metadata, not file contents, and requires the attacker to have some level of local code execution with limited read privileges. The issue was identified and patched in versions 2.5.3 and 2.2.15, closing the permission bypass. No public exploits have been reported, indicating low active threat but potential risk in environments relying on strict permission enforcement.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of file metadata, which may aid attackers in reconnaissance or in crafting further attacks by revealing file existence, sizes, and modification times. Although it does not expose file contents, metadata can still leak sensitive operational information or system structure. Organizations using Deno in development, CI/CD pipelines, or serverless environments where scripts run with restricted permissions are at risk. This could impact confidentiality and potentially facilitate privilege escalation or lateral movement if combined with other vulnerabilities. The low CVSS score reflects limited impact and exploitation complexity, but the risk is higher in sensitive environments or where Deno is used in multi-tenant or shared infrastructure common in European cloud deployments.

Mitigation Recommendations

European organizations should immediately upgrade all Deno runtime instances to versions 2.5.3 or 2.2.15 or later to remediate this vulnerability. Review and audit permission configurations in Deno scripts to ensure the principle of least privilege is enforced. Avoid opening files with write-only flags if file metadata access is not required. Implement runtime monitoring to detect anomalous use of file stat APIs. In environments where upgrading is delayed, consider restricting execution of untrusted or third-party Deno scripts and isolate Deno workloads to minimize potential impact. Incorporate this vulnerability into vulnerability management and patching workflows, and educate developers on secure use of Deno’s permission model.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-30T19:43:49.903Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e5b7a8a677756fc9ab1387

Added to database: 10/8/2025, 1:00:24 AM

Last enriched: 10/8/2025, 1:15:22 AM

Last updated: 10/8/2025, 10:56:27 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats