{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:42:05.950","vulnerabilities":[{"cve":{"id":"CVE-2025-61786","sourceIdentifier":"security-advisories@github.com","published":"2025-10-08T01:15:33.010","lastModified":"2025-10-16T18:13:38.117","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.stat` and `Deno.FsFile.prototype.statSync` are not limited by the permission model check `--deny-read=./`. It's possible to retrieve stats from files that the user do not have explicit read access to (the script is executed with `--deny-read=./`). Similar APIs like `Deno.stat` and `Deno.statSync` require `allow-read` permission, however, when a file is opened, even with file-write only flags and deny-read permission, it's still possible to retrieve file stats, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.15","matchCriteriaId":"E75979F4-50DD-41E8-932A-C576F86DBFCF"},{"vulnerable":true,"criteria":"cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.5.3","matchCriteriaId":"7DD66938-204A-4542-BA86-274BB232C8C9"}]}]}],"references":[{"url":"https://github.com/denoland/deno/commit/1ab2268c0bcbf9b0468e0e36963f77f8c31c73ec","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/denoland/deno/pull/30876","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/denoland/deno/releases/tag/v2.2.15","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/denoland/deno/releases/tag/v2.5.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/denoland/deno/security/advisories/GHSA-qq26-84mh-26j9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}