CVE-2026-22864

Deno on Windows: How a Capital Letter Broke the Security Model

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 16, 2026·6 min read·5 visits

Executive Summary (TL;DR)

Deno tried to stop you from spawning batch files to prevent command injection. But they checked for '.bat', not '.BAT'. Because Windows is case-insensitive and cmd.exe is a parsing nightmare, this allowed attackers to bypass the filter and inject arbitrary shell commands simply by shouting the file extension.

A command injection vulnerability in the Deno runtime on Windows allowing arbitrary code execution via crafted batch file extensions.

Fix Analysis (2)

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.05%
Top 85% most exploited

Affected Systems

Deno runtime on Windows < 2.5.6

Affected Versions Detail

Product
Affected Versions
Fixed Version
Deno
Deno Land
< 2.5.62.5.6
AttributeDetail
CWE IDCWE-77 (Command Injection)
CVSS v3.18.1 (High)
Attack VectorNetwork (AV:N)
ImpactRemote Code Execution
PlatformWindows (x64/x86)
Exploit StatusFunctional PoC Available
CWE-77
Command Injection

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Vulnerability Timeline

Patch Released (v2.5.6)
2025-10-29
CVE Published
2026-01-15