High severity7.5NVD Advisory· Published Jan 6, 2025· Updated Apr 15, 2026
CVE-2025-21620
CVE-2025-21620
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
deno_fetchcrates.io | >= 0.0.1, < 0.204.0 | 0.204.0 |
denocrates.io | <= 1.46.3 | — |
denocrates.io | >= 2.0.0, < 2.1.2 | 2.1.2 |
Patches
12039abe8d2bcVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.