Cyber Posture

CVE-2025-61787

HighPublic PoC

Published: 08 October 2025

Published
08 October 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse the Windows command shell for execution.

Security Summary

CVE-2025-61787 is a command line injection vulnerability (CWE-77) affecting Deno, a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable on Windows systems specifically when batch files (.bat, .cmd, etc.) are executed. The issue stems from the Windows CreateProcess() API, which implicitly spawns cmd.exe for batch file execution regardless of whether the application specifies it, enabling command injection attacks in Deno. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Attackers can exploit this vulnerability remotely over the network without privileges or user interaction, though it requires high attack complexity. Exploitation occurs when Deno processes a maliciously crafted batch file, allowing injection of arbitrary commands via cmd.exe. Successful attacks can result in high-impact confidentiality, integrity, and availability violations, potentially enabling full system compromise on affected Windows hosts running vulnerable Deno versions.

Deno advisories and release notes recommend upgrading to version 2.5.3 or 2.2.15, which address the issue through targeted fixes documented in the associated GitHub commit, pull request, and security advisory. No additional workarounds are specified beyond applying these patches.

Details

CWE(s)
CWE-77

Affected Products

deno
deno
≤ 2.2.15 · 2.3.0 — 2.5.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.003 Windows Command Shell Execution
Adversaries may abuse the Windows command shell for execution.
Why these techniques?

The vulnerability enables remote exploitation of a public-facing Deno application (T1190) leading to command injection and arbitrary execution via Windows Command Shell (cmd.exe, T1059.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References