CVE-2024-27980

Updated: 2025-10-14 09:20:29.167297

Description:

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x 0.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 13 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:38 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 24 0.0 Not Vulnerable 2026-02-17 18:20:04 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:42 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 22 0.0 Not Vulnerable 2026-02-17 18:20:05 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 14 0.0 Not Vulnerable 2025-12-02 16:36:40 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 20 0.0 Not Vulnerable 2025-12-02 16:36:40 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 23 0.0 Not Vulnerable 2026-02-11 12:35:34 Awaiting complete CVSS data for vulnerability.
Debian 13 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:41 Awaiting complete CVSS data for vulnerability.
EL 10 nodejs 16 0.0 Not Vulnerable 2026-02-10 15:17:06
EL 10 nodejs 20 0.0 Not Vulnerable 2026-02-05 14:08:52
Total: 67