Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
References
| Link | Resource |
|---|---|
| https://github.com/denoland/deno/commit/1ab2268c0bcbf9b0468e0e36963f77f8c31c73ec | Patch |
| https://github.com/denoland/deno/pull/30876 | Issue Tracking Patch |
| https://github.com/denoland/deno/releases/tag/v2.2.15 | Release Notes |
| https://github.com/denoland/deno/releases/tag/v2.5.3 | Release Notes |
| https://github.com/denoland/deno/security/advisories/GHSA-qq26-84mh-26j9 | Exploit Vendor Advisory |
Configurations
History
16 Oct 2025, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* | |
| First Time |
Deno
Deno deno |
|
| References | () https://github.com/denoland/deno/commit/1ab2268c0bcbf9b0468e0e36963f77f8c31c73ec - Patch | |
| References | () https://github.com/denoland/deno/pull/30876 - Issue Tracking, Patch | |
| References | () https://github.com/denoland/deno/releases/tag/v2.2.15 - Release Notes | |
| References | () https://github.com/denoland/deno/releases/tag/v2.5.3 - Release Notes | |
| References | () https://github.com/denoland/deno/security/advisories/GHSA-qq26-84mh-26j9 - Exploit, Vendor Advisory |
08 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-08 01:15
Updated : 2025-10-16 18:13
NVD link : CVE-2025-61786
Mitre link : CVE-2025-61786
CVE.ORG link : CVE-2025-61786
JSON object : View
Products Affected
deno
- deno
CWE
CWE-269
Improper Privilege Management
