FIND-20260329-023 · 2026-03-29 · Innovation Veille
Deno CVE-2026-27190 and CVE-2026-32260 — command injection via node:child_process, fixed in 2.7.2
cve
MEDIUM
Two chained command injection vulnerabilities in Deno's node:child_process polyfill. CVE-2026-27190 (CVSS 8.1 HIGH): versions prior to 2.6.8 allow unauthenticated remote code execution via improper neutralization of shell metacharacters. CVE-2026-32260 (HIGH): versions 2.7.0-2.7.1 bypass the CVE-2026-27190 fix — a $VAR pattern argument is double-quoted instead of single-quoted, allowing backtick command substitution. Fixed in Deno 2.7.2. ODS does not currently use Deno in production services (all backends are Rust/Actix-web), but Deno is on the radar as a potential TypeScript runtime for lightweight services. If evaluated, ensure 2.7.2 or later.
Source
https://advisories.gitlab.com/pkg/cargo/deno/CVE-2026-27190/
ODS Impact
Not directly impacting current ODS stack. Relevant if Deno is adopted for future TypeScript microservices (notification workers, webhook handlers). Monitor and use only Deno >= 2.7.2 in any evaluation.
Security Review
License: MIT | Maintenance: ACTIVE | Risk: MEDIUM | Recommendation: USE_WITH_CAUTION
Tags
deno
cve
rce
command-injection
typescript-runtime
nodejs-compat