CVE-2025-66479

| EUVD-2025-201249 LOW
1.8
CVSS 4.0

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 15, 2026 - 16:35 euvd
EUVD-2025-201249
Analysis Generated
Mar 15, 2026 - 16:35 vuln.today
CVE Published
Dec 04, 2025 - 21:16 nvd
LOW 1.8

Tags

Description

Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.

Analysis

A remote code execution vulnerability in Anthropic Sandbox Runtime (CVSS 1.8) that allows sandboxed code. Remediation should follow standard vulnerability management procedures.

Technical Context

CWE-693 (Protection Mechanism Failure). Affects Anthropic Sandbox Runtime.

Affected Products

['Anthropic Sandbox Runtime']

Remediation

Monitor vendor channels for patch availability.

Priority Score

9
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +9
POC: 0

Share

CVE-2025-66479 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy