← Back to CVEs
CVE-2026-22864
HIGH8.1
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6.
CVE Details
CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published1/15/2026
Last Modified1/21/2026
Sourcenvd
Honeypot Sightings0
Affected Products
deno:deno
Weaknesses (CWE)
CWE-77
References
https://github.com/denoland/deno/releases/tag/v2.5.6(security-advisories@github.com)
https://github.com/denoland/deno/security/advisories/GHSA-m3c4-prhw-mrx6(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.