CVE-2025-61786

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*
cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*

History

16 Oct 2025, 18:13

Type Values Removed Values Added
CPE cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*
First Time Deno
Deno deno
References () https://github.com/denoland/deno/commit/1ab2268c0bcbf9b0468e0e36963f77f8c31c73ec - () https://github.com/denoland/deno/commit/1ab2268c0bcbf9b0468e0e36963f77f8c31c73ec - Patch
References () https://github.com/denoland/deno/pull/30876 - () https://github.com/denoland/deno/pull/30876 - Issue Tracking, Patch
References () https://github.com/denoland/deno/releases/tag/v2.2.15 - () https://github.com/denoland/deno/releases/tag/v2.2.15 - Release Notes
References () https://github.com/denoland/deno/releases/tag/v2.5.3 - () https://github.com/denoland/deno/releases/tag/v2.5.3 - Release Notes
References () https://github.com/denoland/deno/security/advisories/GHSA-qq26-84mh-26j9 - () https://github.com/denoland/deno/security/advisories/GHSA-qq26-84mh-26j9 - Exploit, Vendor Advisory

08 Oct 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-08 01:15

Updated : 2025-10-16 18:13


NVD link : CVE-2025-61786

Mitre link : CVE-2025-61786

CVE.ORG link : CVE-2025-61786


JSON object : View

Products Affected

deno

  • deno
CWE
CWE-269

Improper Privilege Management