1 results (0.014 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

03 Feb 2025 — zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. This issue has been patched in version 8.3.2. • https://github.com/google/zx/pull/1094 • CWE-94: Improper Control of Generation of Code ('Code Injection') •