Vulnerability Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even when the file is opened with `read` only permission (and `write`: `false`) and file write operations are not allowed (the script is executed with `--deny-write=./`). Similar APIs like `Deno.utime` and `Deno.utimeSync` require `allow-write` permission, however, when a file is opened, even with read only flags and deny-write permission, it's still possible to change the access (`atime`) and modification (`mtime`) times, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Deno | Deno | <= 2.2.15 |
Related Weaknesses (CWE)
References
- https://github.com/denoland/deno/commit/992e998dfe436cdc9325232759af8be92f11739bPatch
- https://github.com/denoland/deno/pull/30872Issue TrackingPatch
- https://github.com/denoland/deno/releases/tag/v2.2.15Release Notes
- https://github.com/denoland/deno/releases/tag/v2.5.3Release Notes
- https://github.com/denoland/deno/security/advisories/GHSA-vg2r-rmgp-cgqjExploitVendor Advisory
FAQ
What is CVE-2025-61785?
CVE-2025-61785 is a vulnerability with a CVSS score of 3.3 (LOW). Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission ...
How severe is CVE-2025-61785?
CVE-2025-61785 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61785?
Check the references section above for vendor advisories and patch information. Affected products include: Deno Deno.