CVE-2024-27980

Updated: 2025-10-14 09:20:29.167297

Description:

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x 0.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 11 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:44
Debian 11 nodejs 20 0.0 Not Vulnerable 2025-12-02 16:36:28
Debian 11 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:23
Debian 11 nodejs 14 0.0 Not Vulnerable 2025-12-02 16:36:22
Debian 12 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:43 Awaiting complete CVSS data for vulnerability.
Debian 12 nodejs 14 0.0 Not Vulnerable 2025-12-02 16:36:21 Awaiting complete CVSS data for vulnerability.
Debian 12 nodejs 20 0.0 Not Vulnerable 2025-12-02 16:36:27 Awaiting complete CVSS data for vulnerability.
Debian 12 nodejs 23 0.0 Not Vulnerable 2026-02-11 12:35:33 Awaiting complete CVSS data for vulnerability.
Debian 12 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:19 Awaiting complete CVSS data for vulnerability.
Debian 12 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:22 Awaiting complete CVSS data for vulnerability.
Total: 67