Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Deno
Deno deno |
|
CPEs | cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:* | |
Vendors & Products |
Deno
Deno deno |
|
Metrics |
cvssV3_1
|
Wed, 04 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Jun 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 2.2.0 and prior to versions 2.2.5, it is possible to bypass Deno's permission read/write db permission check by using `ATTACH DATABASE` statement. Version 2.2.5 contains a patch for the issue. | |
Title | Deno has --allow-read / --allow-write permission bypass in `node:sqlite` | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-04T19:31:26.840Z
Updated: 2025-06-04T20:41:22.848Z
Reserved: 2025-05-28T18:49:07.577Z
Link: CVE-2025-48935

Updated: 2025-06-04T20:41:19.649Z

Status : Analyzed
Published: 2025-06-04T20:15:24.330
Modified: 2025-07-02T13:17:12.510
Link: CVE-2025-48935

No data.