CVE-2026-27190
Deno has a Command Injection via Incomplete shell metacharacter blocklist in node:child_process
CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.
| CWE | CWE-78 |
| Vendor | denoland |
| Product | deno |
| Published | Feb 20, 2026 |
| Last Updated | Feb 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for denoland deno
Be the first to know when new high vulnerabilities affecting denoland deno are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
denoland / deno
< 2.6.8