CVE-2026-1665

N/A Unknown
Published: January 29, 2026 Modified: February 04, 2026
View on NVD

Description

A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path). An attacker who can set environment variables in a victim's shell environment (e.g., via malicious CI/CD configurations, compromised dotfiles, or Docker images) can inject arbitrary shell commands that execute when the victim runs nvm commands that trigger downloads, such as 'nvm install' or 'nvm ls-remote'.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/nvm-sh/nvm
Source: ce714d77-add3-4f53-aff5-83d477b104bb
https://github.com/nvm-sh/nvm/pull/3380
Source: ce714d77-add3-4f53-aff5-83d477b104bb
https://github.com/nvm-sh/nvm/releases/tag/v0.40.4
Source: ce714d77-add3-4f53-aff5-83d477b104bb

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)