
CVE-2025-55195 – @std/toml Prototype Pollution in Node.js and Browser
https://notcve.org/view.php?id=CVE-2025-55195
14 Aug 2025 — @std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9. • https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVE-2024-52793 – XSS vulnerability in serveDir API of @std/http/file-server on POSIX systems
https://notcve.org/view.php?id=CVE-2024-52793
22 Nov 2024 — The Deno Standard Library provides APIs for Deno and the Web. Prior to version 1.0.11, `http/file-server`'s `serveDir` with `showDirListing: true` option is vulnerable to cross-site scripting when the attacker is a user who can control file names in the source directory on systems with POSIX file names. Exploitation might also be possible on other systems but less trivial due to e.g. lack of file name support for `<>` in Windows. Version 1.0.11 fixes the issue. • https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L507 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •