We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48069

ejson2env has insufficient input sanitization



Description

ejson2env allows users to decrypt EJSON secrets and export them as environment variables. Prior to version 2.0.8, the `ejson2env` tool has a vulnerability related to how it writes to `stdout`. Specifically, the tool is intended to write an export statement for environment variables and their values. However, due to inadequate output sanitization, there is a potential risk where variable names or values may include malicious content, resulting in additional unintended commands being output to `stdout`. If this output is improperly utilized in further command execution, it could lead to command injection, allowing an attacker to execute arbitrary commands on the host system. Version 2.0.8 sanitizes output during decryption. Other mitigations involve avoiding use of `ejson2env` to decrypt untrusted user secrets and/or avoiding evaluating or executing the direct output from `ejson2env` without removing nonprintable characters.

Reserved 2025-05-15 | Published 2025-05-21 | Updated 2025-05-21 | Assigner GitHub_M


MEDIUM: 6.6CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 2.0.8
affected

References

github.com/...on2env/security/advisories/GHSA-2c47-m757-32g6

github.com/...ommit/592b3ceea967fee8b064e70983e8cec087b6d840

cve.org (CVE-2025-48069)

nvd.nist.gov (CVE-2025-48069)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48069

Support options

Helpdesk Chat, Email, Knowledgebase