Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even when the file is opened with `read` only permission (and `write`: `false`) and file write operations are not allowed (the script is executed with `--deny-write=./`). Similar APIs like `Deno.utime` and `Deno.utimeSync` require `allow-write` permission, however, when a file is opened, even with read only flags and deny-write permission, it's still possible to change the access (`atime`) and modification (`mtime`) times, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime. In versions prior to 2.5.3 and 2.2.15, `Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`. It's possible to change to change the access (`atime`) and modification (`mtime`) times on the file stream resource even when the file is opened with `read` only permission (and `write`: `false`) and file write operations are not allowed (the script is executed with `--deny-write=./`). Similar APIs like `Deno.utime` and `Deno.utimeSync` require `allow-write` permission, however, when a file is opened, even with read only flags and deny-write permission, it's still possible to change the access (`atime`) and modification (`mtime`) times, and thus bypass the permission model. Versions 2.5.3 and 2.2.15 fix the issue. | |
Title | Deno's --deny-write check does not prevent permission bypass | |
Weaknesses | CWE-266 | |
References |
|
|
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-08T00:37:01.869Z
Reserved: 2025-09-30T19:43:49.902Z
Link: CVE-2025-61785

No data.

Status : Received
Published: 2025-10-08T01:15:32.847
Modified: 2025-10-08T01:15:32.847
Link: CVE-2025-61785

No data.

No data.