Environment Variable Disclosure in Deno Runtime by DenoLand
CVE-2025-48934

5.5MEDIUM

Key Information:

Vendor

Denoland

Status
Vendor
CVE Published:
4 June 2025

What is CVE-2025-48934?

The Deno runtime, utilized for JavaScript, TypeScript, and WebAssembly, possesses a vulnerability where the Deno.env.toObject method does not respect the variables listed in the --deny-env option of the deno run command. This oversight creates the potential for attackers to read sensitive environment variables that should have been restricted, particularly when software relies on this combination of options for increased security. Affected versions have been patched in 2.1.13 and 2.2.13, thereby mitigating the risk.

Affected Version(s)

deno < 2.1.13 < 2.1.13

deno >= 2.2.0, < 2.2.13 < 2.2.0, 2.2.13

References

CVSS V4

Score:
5.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.