CVE-2024-36138

Updated: 2025-08-20 03:13:23.03792

Description:

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x 0.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Alpine Linux 3.22 nodejs 14 0.0 Not Vulnerable 2026-02-03 17:19:29 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 16 0.0 Not Vulnerable 2026-02-03 17:19:28 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 18 0.0 Not Vulnerable 2026-02-03 17:19:28 Awaiting complete CVSS data for vulnerability.
Alpine Linux 3.22 nodejs 23 0.0 Not Vulnerable 2026-02-11 12:35:25 Awaiting complete CVSS data for vulnerability.
Debian 10 nodejs 16 0.0 Not Vulnerable 2025-11-24 18:52:34
Debian 10 nodejs 20 0.0 Not Vulnerable 2025-11-24 18:52:15
Debian 10 nodejs 18 0.0 Not Vulnerable 2025-11-24 18:52:16
Debian 10 nodejs 14 0.0 Not Vulnerable 2025-11-24 18:52:09
Debian 10 nodejs 12 0.0 Not Vulnerable 2025-11-24 18:52:10
Debian 11 nodejs 18 0.0 Not Vulnerable 2025-11-24 18:52:15
Total: 67