LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32260

CVE-2026-32260 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 12, 2026

Deno - Command Injection

Published: March 12, 2026Updated: March 12, 2026Remote Exploitable

Overview

Deno 2.7.0 to 2.7.1 contains a command injection caused by improper argument sanitization in node:child_process polyfill shell mode, letting attackers execute arbitrary OS commands bypassing permission system, exploit requires control over spawn arguments.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 17.6%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary OS commands, bypassing permission controls and compromising the system.

Mitigation

Update to version 2.7.2 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 12, 2026

🟠 CVE-2026-32260 - High (8.1) Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument san... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32260/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32260
Severity
High
CVSS Score
8.1
Type
command_injection
Status
unconfirmed
EPSS
17.6%
Social Posts
1

CWE

  • CWE-78

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

17.6%Probability of exploitation in the next 30 days