{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T20:35:25.316","vulnerabilities":[{"cve":{"id":"CVE-2025-21620","sourceIdentifier":"security-advisories@github.com","published":"2025-01-06T23:15:07.770","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2."},{"lang":"es","value":"Deno es un entorno de ejecución de JavaScript, TypeScript y WebAssembly con valores predeterminados seguros. Cuando envía una solicitud con el encabezado Authorization a un dominio y la respuesta solicita redirigir a un dominio diferente, la gestión de redireccionamiento fetch() de Deno gestiona una solicitud de redireccionamiento de seguimiento que conserva el encabezado Authorization original y filtra su contenido a ese segundo dominio. Esta vulnerabilidad se corrigió en 2.1.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://github.com/denoland/deno/security/advisories/GHSA-f27p-cmv8-xhm6","source":"security-advisories@github.com"}]}}]}