CVE-2025-48934

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*
cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*

History

02 Jul 2025, 13:43

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 20:15

Updated : 2025-07-02 13:43


NVD link : CVE-2025-48934

Mitre link : CVE-2025-48934

CVE.ORG link : CVE-2025-48934


JSON object : View

Products Affected

deno

  • deno
CWE
CWE-201

Insertion of Sensitive Information Into Sent Data