Vulnerability Description
A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path). An attacker who can set environment variables in a victim's shell environment (e.g., via malicious CI/CD configurations, compromised dotfiles, or Docker images) can inject arbitrary shell commands that execute when the victim runs nvm commands that trigger downloads, such as 'nvm install' or 'nvm ls-remote'.
Related Weaknesses (CWE)
References
- https://github.com/nvm-sh/nvm
- https://github.com/nvm-sh/nvm/commit/44e2590cdf257faf7d885e4470be8dc66cec9506
- https://github.com/nvm-sh/nvm/pull/3380
- https://github.com/nvm-sh/nvm/releases/tag/v0.40.4
FAQ
What is CVE-2026-1665?
CVE-2026-1665 is a documented vulnerability. A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment va...
How severe is CVE-2026-1665?
CVSS scoring is not yet available for CVE-2026-1665. Check NVD for updates.
Is there a patch for CVE-2026-1665?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.