Executive Summary

Informations
Name CVE-2025-8022 First vendor Publication 2025-07-23
Vendor Cve Last vendor Modification 2025-07-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Versions of the package bun after 0.0.12 are vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in the $ shell API due to improper neutralization of user input. An attacker can exploit this by providing specially crafted input that includes command-line arguments or shell metacharacters, leading to unintended command execution. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8022

Sources (Detail)

https://gist.github.com/lirantal/9780d664037f29d5277d7b2bc569d213
https://security.snyk.io/vuln/SNYK-JS-BUN-9510752
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-07-24 13:20:47
  • Multiple Updates
2025-07-23 13:20:36
  • First insertion