CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
4Tags
Description
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Function} where p is any constructible property. This vulnerability is fixed in 0.8.34.
Analysis
SandboxJS sandbox escape before 0.8.34 via Function access through arrays. CVSS 10.0.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all applications and dependencies using SandboxJS to identify exposure scope; isolate or disable affected services if operationally feasible. Within 7 days: Implement network segmentation to restrict lateral movement from compromised systems; deploy WAF rules to detect exploitation attempts; establish enhanced monitoring for suspicious JavaScript execution patterns. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-12043
GHSA-6r9f-759j-hjgv