-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the main function in index.js where user-supplied parameters (packageName and registry) are directly interpolated into an execSync command without proper sanitization. The patch adds a regex check to block special shell characters, confirming these parameters were vulnerable to injection. The function's use of execSync with untrusted input matches the CWE-77 command injection pattern.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| get-npm-package-version | npm | < 1.0.7 | 1.0.7 |
Ongoing coverage of React2Shell