Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.
INFO
Published Date :
2025-06-04T19:21:17.701Z
Last Modified :
2025-06-04T19:32:14.582Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-48934 vulnerability.
| Vendors | Products |
|---|---|
| Deno |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-48934.