Critical Deno Vulnerabilities Enable Server Secrets Exposure and Windows Command Injection

Critical Deno Vulnerabilities Enable Server Secrets Exposure and Windows Command Injection

Two significant security vulnerabilities have been discovered in Deno, the modern JavaScript and TypeScript runtime known for its "secure by default" architecture.

The flaws could expose sensitive server secrets and allow command injection on Windows systems.

Vulnerabilities

CVE IDCVSS ScoreTypeImpact
CVE-2026-228639.2 (Critical)Missing Cryptographic StepSecrets exposure
CVE-2026-22864HighCommand InjectionArbitrary code execution on Windows

CVE-2026-22863 - Cryptographic Flaw

The more severe vulnerability resides in Deno's node:crypto compatibility layer - a module that allows Deno to run code originally written for Node.js.

The flaw involves the cipher not being properly finalized, which allows attackers to perform infinite encryptions. This can lead to brute force attacks or more refined attacks aimed at learning server secrets.

Affected versions: Deno 2.5.6 and earlier

CVE-2026-22864 - Windows Command Injection

The second vulnerability is an incomplete fix for command injection prevention on Windows. The flaw allows case-insensitive extension bypass, potentially enabling arbitrary command execution on vulnerable Windows systems.

Remediation

All users should upgrade to Deno v2.6.0 or newer immediately.

Why This Matters

Deno markets itself as "secure by default" - a runtime designed to address Node.js security shortcomings. These vulnerabilities undermine that promise, particularly for:

  • Applications using the Node.js compatibility layer
  • Production deployments on Windows
  • Services handling sensitive cryptographic operations

Organizations running Deno in production should prioritize this update.

Read more