We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30222

Shescape has potential environment variable exposure on Windows with CMD



Description

Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape.

Reserved 2025-03-18 | Published 2025-03-25 | Updated 2025-03-26 | Assigner GitHub_M


LOW: 2.1CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

>= 1.7.2, < 2.1.2
affected

References

github.com/...escape/security/advisories/GHSA-66pp-5p9w-q87j

github.com/ericcornelissen/shescape/pull/1916

github.com/...ommit/0a81f1eb077bab8caae283a2490cd7be9af179c6

github.com/ericcornelissen/shescape/releases/tag/v2.1.2

cve.org (CVE-2025-30222)

nvd.nist.gov (CVE-2025-30222)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30222

Support options

Helpdesk Chat, Email, Knowledgebase