Home

Description

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. An attacker who can control environment variables during pnpm operations could achieve Remote Code Execution (RCE) in build environments. This issue is fixed in version 10.27.0.

PUBLISHED Reserved 2025-12-30 | Published 2026-01-07 | Updated 2026-01-09 | Assigner GitHub_M




HIGH: 7.6CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

>=6.25.0, < 10.27.0
affected

References

github.com/pnpm/pnpm/security/advisories/GHSA-2phv-j68v-wwqx exploit

github.com/pnpm/pnpm/security/advisories/GHSA-2phv-j68v-wwqx

github.com/pnpm/pnpm/releases/tag/v10.27.0

cve.org (CVE-2025-69262)

nvd.nist.gov (CVE-2025-69262)

Download JSON