Incorrect Authorization Affecting deno package, versions <0.3.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-DENO-15202476
  • published4 Feb 2026
  • disclosed1 Feb 2026
  • creditUnknown

Introduced: 1 Feb 2026

CVE NOT AVAILABLE CWE-863  (opens in a new tab)

How to fix?

Upgrade deno to version 0.3.2 or higher.

Overview

deno is an a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust.

Affected versions of this package are vulnerable to Incorrect Authorization via the libdeno.send interface exposing the op_fetch_module_meta_data operation. An attacker can bypass the permission model by invoking this privileged operation without proper permission checks, allowing untrusted code to read arbitrary files and perform unauthorized network requests, effectively escaping the intended security sandbox.

References

CVSS Base Scores

version 4.0
version 3.1