Permissive Access Issue in Deno Runtime by Deno Land
CVE-2025-48888

5.5MEDIUM

Key Information:

Vendor

Denoland

Status
Vendor
CVE Published:
4 June 2025

What is CVE-2025-48888?

Deno, a runtime for JavaScript, TypeScript, and WebAssembly, has a vulnerability where flag misconfigurations (--allow-* combined with --deny-*) lead to unintended permission grants. Specifically, using the deno run --allow-read --deny-read main.ts command permits access even when the 'deny' flag should take precedence. While this affects nonsensical combinations of flags, it is crucial for users to update to versions 2.1.13, 2.2.13, or 2.3.2 to ensure proper permission handling.

Affected Version(s)

deno >= 1.41.3, < 2.1.13 < 1.41.3, 2.1.13

deno >= 2.2.0, < 2.2.13 < 2.2.0, 2.2.13

deno >= 2.3.0, < 2.3.2 < 2.3.0, 2.3.2

References

CVSS V4

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.