First published: Tue Mar 25 2025(Updated: )
Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
>=1.7.2<=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30222 is considered moderate due to potential exposure of environment variables.
To fix CVE-2025-30222, upgrade Shescape to version 2.1.2 or later.
Shescape versions 1.7.2 through 2.1.1 are affected by CVE-2025-30222.
Users of Shescape on Windows who configure the shell as 'cmd.exe' or 'shell: true' are impacted by CVE-2025-30222.
CVE-2025-30222 is a vulnerability related to potential environment variable exposure in the Shescape library.