CVE-2026-25520

Source
https://cve.org/CVERecord?id=CVE-2026-25520
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25520.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25520
Aliases
Published
2026-02-06T19:53:24.219Z
Modified
2026-03-13T04:10:45.353399Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
SandboxJS has a Sandbox Escape
Details

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can obtain the hosts Function constructor, which can be used to execute arbitrary code outside of the sandbox. This vulnerability is fixed in 0.8.29.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-74"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25520.json"
}
References

Affected packages

Git / github.com/nyariv/sandboxjs

Affected ranges

Type
GIT
Repo
https://github.com/nyariv/sandboxjs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.5.0
0.5.2
0.5.3
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.8.0
0.8.1
0.8.10
0.8.11
0.8.12
0.8.14
0.8.15
0.8.15.1
0.8.16
0.8.17
0.8.18
0.8.19
0.8.2
0.8.20
0.8.21
0.8.22
0.8.23
0.8.23-1
0.8.23.2
0.8.23.3
0.8.24
0.8.24-1
0.8.24-2
0.8.27
0.8.28
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
v0.*
v0.8.28

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25520.json"