Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape.
CVSS
No CVSS.
References
Configurations
No configuration.
History
26 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ericcornelissen/shescape/security/advisories/GHSA-66pp-5p9w-q87j - | |
Summary |
|
25 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-25 23:15
Updated : 2025-03-27 16:45
NVD link : CVE-2025-30222
Mitre link : CVE-2025-30222
CVE.ORG link : CVE-2025-30222
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor