- Description
- pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. An attacker who can control environment variables during pnpm operations could achieve Remote Code Execution (RCE) in build environments. This issue is fixed in version 10.27.0.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- pnpm
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-78
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pnpm:pnpm:*:*:*:*:*:*:node.js:*",
"matchCriteriaId": "CA432522-59B0-4DD7-AB6E-AE3D30B63EDC",
"versionEndExcluding": "10.27.0",
"versionStartIncluding": "6.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]