Updated: 2025-10-14 09:20:29.167297
Description:
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | 0.0 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Ubuntu 18.04 | nodejs | 12 | 0.0 | Not Vulnerable | 2025-12-02 16:36:27 | |||
| Ubuntu 18.04 | nodejs | 16 | 0.0 | Not Vulnerable | 2025-12-02 16:36:45 | |||
| Ubuntu 20.04 | nodejs | 20 | 0.0 | Not Vulnerable | 2025-12-02 16:36:31 | |||
| Ubuntu 20.04 | nodejs | 18 | 0.0 | Not Vulnerable | 2025-12-02 16:36:20 | |||
| Ubuntu 20.04 | nodejs | 14 | 0.0 | Not Vulnerable | 2025-12-02 16:36:39 | |||
| Ubuntu 20.04 | nodejs | 12 | 0.0 | Not Vulnerable | 2025-12-02 16:36:26 | |||
| Ubuntu 20.04 | nodejs | 16 | 0.0 | Not Vulnerable | 2025-12-02 16:36:42 | |||
| Ubuntu 22.04 | nodejs | 16 | 0.0 | Not Vulnerable | 2025-12-02 16:36:43 | |||
| Ubuntu 22.04 | nodejs | 18 | 0.0 | Not Vulnerable | 2025-12-02 16:36:31 | |||
| Ubuntu 22.04 | nodejs | 12 | 0.0 | Not Vulnerable | 2025-12-02 16:36:25 |