CVE-2020-28437
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2020-28437) affects all versions of the heroku-env package, which is designed to parse DATABASE_URL from Heroku config and split it into PG* environment variables used by psql, pg_dump, pg_restore, and node-postgres. The vulnerability was disclosed on January 26, 2021, and was discovered by the JHU System Security Lab (Snyk).

Technical details

The vulnerability is a Command Injection flaw located in lib/get.js, which is required by index.js. The vulnerability has received a CVSS v3.1 Base Score of 9.8 (Critical), with attack vector being Network, attack complexity Low, requiring no privileges or user interaction, and having an unchanged scope. The vulnerability affects confidentiality, integrity, and availability, with High impact ratings for all three aspects (AttackerKB, Snyk).

Impact

The vulnerability can result in a total loss of confidentiality, leading to all resources within the impacted component being exposed to the attacker. There is also a complete loss of integrity, allowing the attacker to modify protected files. The availability impact is rated as high, potentially causing significant disruption to the system's resources (Snyk).

Mitigation and workarounds

Currently, there is no fixed version available for the heroku-env package (Snyk).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23947CRITICAL9.3
  • JavaScriptJavaScript
  • @orval/core
NoYesJan 20, 2026
CVE-2026-23950HIGH8.8
  • JavaScriptJavaScript
  • grafana-graphite
NoYesJan 20, 2026
CVE-2026-22037HIGH8.4
  • JavaScriptJavaScript
  • @fastify/express
NoYesJan 19, 2026
CVE-2026-23522LOW3.7
  • JavaScriptJavaScript
  • @lobehub/chat
NoNoJan 19, 2026
CVE-2025-66803LOW1.7
  • JavaScriptJavaScript
  • @hotwired/turbo
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management