Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-69262

Опубликовано: 07 янв. 2026
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. An attacker who can control environment variables during pnpm operations could achieve Remote Code Execution (RCE) in build environments. This issue is fixed in version 10.27.0.

A flaw was found in pnpm. This command injection vulnerability allows an attacker who can control environment variables during pnpm operations to execute arbitrary code. The vulnerability arises from improper handling of environment variable substitution within .npmrc configuration files, particularly when tokenHelper settings are used. Successful exploitation can lead to remote code execution in build environments.

Отчет

This vulnerability is rated Moderate for Red Hat. The flaw in pnpm allows for remote code execution via command injection when environment variable substitution is used in .npmrc files with tokenHelper settings. Exploitation requires an attacker to control environment variables and place malicious scripts, primarily impacting build environments such as CI/CD pipelines or Docker builds. Red Hat products like Enterprise Application Platform are not directly affected by this pnpm vulnerability.

Меры по смягчению последствий

To reduce exposure, avoid using the tokenHelper setting in .npmrc configuration files. Instead, configure authentication using direct tokens. It is also recommended to audit and restrict environment variables in build environments, including CI/CD pipelines and container build processes, to prevent unauthorized control.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2427662pnpm: pnpm: Remote code execution via command injection in tokenHelper environment variable substitution

EPSS

Процентиль: 21%
0.0007
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
3 месяца назад

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Command Injection vulnerability when using environment variable substitution in .npmrc configuration files with tokenHelper settings. An attacker who can control environment variables during pnpm operations could achieve Remote Code Execution (RCE) in build environments. This issue is fixed in version 10.27.0.

CVSS3: 7.5
debian
3 месяца назад

pnpm is a package manager. Versions 6.25.0 through 10.26.2 have a Comm ...

CVSS3: 7.5
github
3 месяца назад

pnpm vulnerable to Command Injection via environment variable substitution

EPSS

Процентиль: 21%
0.0007
Низкий

7.5 High

CVSS3