CVE-2024-27980

Updated: 2025-10-14 09:20:29.167297

Description:

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x 0.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Alpine Linux 3.22 nodejs 14 0.0 Not Vulnerable 2026-02-03 17:19:34 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 16 0.0 Not Vulnerable 2026-02-03 17:19:34 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 18 0.0 Not Vulnerable 2026-02-03 17:19:33 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 23 0.0 Not Vulnerable 2026-02-11 12:35:32 Awaiting complete CVSS data for vulnerability.
Debian 10 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:45
Debian 10 nodejs 20 0.0 Not Vulnerable 2025-12-02 16:36:29
Debian 10 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:29
Debian 10 nodejs 14 0.0 Not Vulnerable 2025-12-02 16:36:23
Debian 10 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:23
Debian 11 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:28
Total: 67