Advisories for Npm/Wrangler package

2026

Wrangler affected by OS Command Injection in `wrangler pages deploy`

Summary A command injection vulnerability (CWE-78) has been found to exist in the wrangler pages deploy command. The issue occurs because the –commit-hash parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of –commit-hash to execute arbitrary commands on the system running Wrangler. Root cause The commitHash variable, derived from user input via the –commit-hash CLI argument, is interpolated directly into …

Duplicate Advisory: Wrangler affected by OS Command Injection in `wrangler pages deploy`

Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-36p8-mvp6-cv38. This link is maintained to preserve external references. Original Description SummaryA command injection vulnerability (CWE-78) has been found to exist in the wrangler pages deploy command. The issue occurs because the –commit-hash parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of –commit-hash to execute arbitrary commands …

2023

Improper Privilege Management

The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server does not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious …

Improper Authentication

Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The Wrangler command line tool (<=wrangler@3.1.0) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.