Metrics
Affected Vendors & Products
Thu, 24 Jul 2025 05:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package bun are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution. | Versions of the package bun after 0.0.12 are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past. |
Wed, 23 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bun
Bun bun |
|
Vendors & Products |
Bun
Bun bun |
Wed, 23 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package bun are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-07-24T04:35:40.353Z
Reserved: 2025-07-22T07:57:04.973Z
Link: CVE-2025-8022

Updated: 2025-07-23T14:47:43.025Z

Status : Received
Published: 2025-07-23T05:15:30.933
Modified: 2025-07-24T07:15:55.157
Link: CVE-2025-8022

No data.