Sandboxjs

8 CVEs product

Monthly

CVE-2026-26954 CRITICAL PATCH Act Now

SandboxJS sandbox escape before 0.8.34 via Function access through arrays. CVSS 10.0.

RCE Code Injection Sandboxjs
NVD GitHub VulDB
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25881 CRITICAL POC PATCH Act Now

SandboxJS prior to 0.8.31 has yet another sandbox escape via prototype pollution, the sixth distinct escape technique discovered.

RCE Sandboxjs
NVD GitHub
CVSS 3.1
9.0
EPSS
0.1%
CVE-2026-25641 CRITICAL POC PATCH Act Now

SandboxJS has a fifth CVSS 10.0 escape via a TOCTOU race condition in sandbox validation, allowing code to slip through during the check-execute gap.

Information Disclosure Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25587 CRITICAL POC PATCH Act Now

SandboxJS has a fourth CVSS 10.0 sandbox escape through Map's safe prototype being used as a gateway to inject arbitrary code.

Code Injection RCE Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25586 CRITICAL POC PATCH Act Now

SandboxJS has a third CVSS 10.0 sandbox escape via Map prototype shadowing that allows complete sandbox bypass.

Information Disclosure Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25520 CRITICAL POC PATCH Act Now

SandboxJS has a second CVSS 10.0 sandbox escape where function return values aren't properly sanitized, allowing code execution outside the sandbox.

RCE Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25142 CRITICAL POC PATCH Act Now

Sandbox escape in SandboxJS before 0.8.27 via __lookupGetter__ prototype chain access. CVSS 10.0 — complete sandbox bypass. PoC and patch available.

RCE Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.2%
CVE-2026-23830 CRITICAL POC PATCH Act Now

SandboxJS library prior to 0.8.26 has a CVSS 10.0 sandbox escape via AsyncFunction constructor, allowing execution of arbitrary code outside the sandbox boundary.

RCE Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.2%
CVE-2026-26954
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

SandboxJS sandbox escape before 0.8.34 via Function access through arrays. CVSS 10.0.

RCE Code Injection Sandboxjs
NVD GitHub VulDB
CVE-2026-25881
EPSS 0% CVSS 9.0
CRITICAL POC PATCH Act Now

SandboxJS prior to 0.8.31 has yet another sandbox escape via prototype pollution, the sixth distinct escape technique discovered.

RCE Sandboxjs
NVD GitHub
CVE-2026-25641
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a fifth CVSS 10.0 escape via a TOCTOU race condition in sandbox validation, allowing code to slip through during the check-execute gap.

Information Disclosure Sandboxjs
NVD GitHub
CVE-2026-25587
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a fourth CVSS 10.0 sandbox escape through Map's safe prototype being used as a gateway to inject arbitrary code.

Code Injection RCE Sandboxjs
NVD GitHub
CVE-2026-25586
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a third CVSS 10.0 sandbox escape via Map prototype shadowing that allows complete sandbox bypass.

Information Disclosure Sandboxjs
NVD GitHub
CVE-2026-25520
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a second CVSS 10.0 sandbox escape where function return values aren't properly sanitized, allowing code execution outside the sandbox.

RCE Sandboxjs
NVD GitHub
CVE-2026-25142
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Sandbox escape in SandboxJS before 0.8.27 via __lookupGetter__ prototype chain access. CVSS 10.0 — complete sandbox bypass. PoC and patch available.

RCE Sandboxjs
NVD GitHub
CVE-2026-23830
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS library prior to 0.8.26 has a CVSS 10.0 sandbox escape via AsyncFunction constructor, allowing execution of arbitrary code outside the sandbox boundary.

RCE Sandboxjs
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy