CVE-2026-34217
- EPSS 0.07%
- Veröffentlicht 06.04.2026 15:12:52
- Zuletzt bearbeitet 09.04.2026 18:03:17
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing s...
CVE-2026-34211
- EPSS 0.06%
- Veröffentlicht 06.04.2026 15:10:42
- Zuletzt bearbeitet 09.04.2026 18:05:21
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandboxjs parser contains unbounded recursion in the restOfExp function and the lispify/lispifyExpr call chain. An attacker can crash any Node.js process that parses untrusted...
- EPSS 0.18%
- Veröffentlicht 06.04.2026 15:09:28
- Zuletzt bearbeitet 09.04.2026 18:07:20
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.ca...
CVE-2026-32723
- EPSS 0.01%
- Veröffentlicht 18.03.2026 21:27:35
- Zuletzt bearbeitet 19.03.2026 19:20:39
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers have an execution-quota bypass. A global tick state (`currentTicks.current`) is shared between sandboxes. Timer string handlers are compiled at execution time using that ...
- EPSS 0.06%
- Veröffentlicht 13.03.2026 15:51:13
- Zuletzt bearbeitet 17.03.2026 20:13:06
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Funct...
- EPSS 0.06%
- Veröffentlicht 09.02.2026 21:12:58
- Zuletzt bearbeitet 18.02.2026 18:07:12
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prot...
- EPSS 0.03%
- Veröffentlicht 06.02.2026 19:54:38
- Zuletzt bearbeitet 18.02.2026 14:32:36
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __p...
- EPSS 0.05%
- Veröffentlicht 06.02.2026 19:53:24
- Zuletzt bearbeitet 18.02.2026 14:33:15
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can obt...
- EPSS 0.03%
- Veröffentlicht 06.02.2026 19:51:56
- Zuletzt bearbeitet 18.02.2026 14:31:17
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.
- EPSS 0.03%
- Veröffentlicht 06.02.2026 19:50:11
- Zuletzt bearbeitet 18.02.2026 14:01:02
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in prope...