Shescape is a simple shell escape library for JavaScript. Prior to 2.1.9, an attacker may be able to bypass escaping for the shell being used. This can result, for example, in exposure of sensitive information. This impacts users of Shescape that configure their shell to point to a file on disk that is a link to a link. The precise result of being affected depends on the actual shell used and incorrect shell identified by Shescape. This vulnerability is fixed in 2.1.9.
CVSS
No CVSS.
References
Configurations
No configuration.
History
10 Mar 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ericcornelissen/shescape/security/advisories/GHSA-6f6w-6j58-rq76 - |
10 Mar 2026, 17:40
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 17:40
Updated : 2026-03-11 13:53
NVD link : CVE-2026-30916
Mitre link : CVE-2026-30916
CVE.ORG link : CVE-2026-30916
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
