FIND-20260329-023 · 2026-03-29 · Innovation Veille

Deno CVE-2026-27190 and CVE-2026-32260 — command injection via node:child_process, fixed in 2.7.2

cve MEDIUM
Two chained command injection vulnerabilities in Deno's node:child_process polyfill. CVE-2026-27190 (CVSS 8.1 HIGH): versions prior to 2.6.8 allow unauthenticated remote code execution via improper neutralization of shell metacharacters. CVE-2026-32260 (HIGH): versions 2.7.0-2.7.1 bypass the CVE-2026-27190 fix — a $VAR pattern argument is double-quoted instead of single-quoted, allowing backtick command substitution. Fixed in Deno 2.7.2. ODS does not currently use Deno in production services (all backends are Rust/Actix-web), but Deno is on the radar as a potential TypeScript runtime for lightweight services. If evaluated, ensure 2.7.2 or later.

Source

https://advisories.gitlab.com/pkg/cargo/deno/CVE-2026-27190/

ODS Impact

Not directly impacting current ODS stack. Relevant if Deno is adopted for future TypeScript microservices (notification workers, webhook handlers). Monitor and use only Deno >= 2.7.2 in any evaluation.

Security Review

License: MIT | Maintenance: ACTIVE | Risk: MEDIUM | Recommendation: USE_WITH_CAUTION

Tags

deno cve rce command-injection typescript-runtime nodejs-compat