Enclave

3 CVEs product

Monthly

CVE-2026-27597 CRITICAL POC PATCH Act Now

Sandbox escape in Enclave JavaScript sandbox before 2.11.1. Enclave is designed for safe AI agent code execution — the escape allows agents to execute arbitrary code outside the sandbox. CVSS 10.0, PoC and patch available.

RCE AI / ML Enclave
NVD GitHub
CVSS 3.1
10.0
EPSS
0.5%
CVE-2026-25533 HIGH POC PATCH This Week

Enclave versions up to 2.10.1 is affected by loop with unreachable exit condition (infinite loop) (CVSS 8.8).

Denial Of Service RCE AI / ML Enclave
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-22686 CRITICAL POC PATCH Act Now

enclave-vm JavaScript sandbox (before 2.7.0) has a critical sandbox escape. When a tool invocation fails, a host-side Error object is exposed to sandboxed code, which can use its prototype chain to access the host Node.js runtime. Maximum CVSS 10.0 with scope change. PoC available, patch available.

Node.js AI / ML Enclave
NVD GitHub
CVSS 3.1
10.0
EPSS
0.2%
CVE-2026-27597
EPSS 1% CVSS 10.0
CRITICAL POC PATCH Act Now

Sandbox escape in Enclave JavaScript sandbox before 2.11.1. Enclave is designed for safe AI agent code execution — the escape allows agents to execute arbitrary code outside the sandbox. CVSS 10.0, PoC and patch available.

RCE AI / ML Enclave
NVD GitHub
CVE-2026-25533
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Enclave versions up to 2.10.1 is affected by loop with unreachable exit condition (infinite loop) (CVSS 8.8).

Denial Of Service RCE AI / ML +1
NVD GitHub
CVE-2026-22686
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

enclave-vm JavaScript sandbox (before 2.7.0) has a critical sandbox escape. When a tool invocation fails, a host-side Error object is exposed to sandboxed code, which can use its prototype chain to access the host Node.js runtime. Maximum CVSS 10.0 with scope change. PoC available, patch available.

Node.js AI / ML Enclave
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy