CVE-2026-25533

Source
https://cve.org/CVERecord?id=CVE-2026-25533
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25533.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25533
Aliases
Published
2026-02-06T21:16:57.162Z
Modified
2026-02-09T02:50:32.343398Z
Severity
  • 6.4 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H CVSS Calculator
Summary
Enclave has a sandbox escape via infinite recursion and error objects
Details

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.

Database specific
{
    "cwe_ids": [
        "CWE-835"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25533.json"
}
References

Affected packages

Git / github.com/agentfront/enclave

Affected ranges

Type
GIT
Repo
https://github.com/agentfront/enclave
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

ast-guard@1.*
ast-guard@1.1.0
ast-guard@1.1.1
ast-guard@1.1.2
ast-guard@2.*
ast-guard@2.0.0
ast-guard@2.1.0
ast-guard@2.2.0
ast-guard@2.3.0
ast-guard@2.4.0
enclave-vm@1.*
enclave-vm@1.0.2
enclave-vm@1.0.3
enclave-vm@2.*
enclave-vm@2.0.0
enclave-vm@2.1.0
enclave-vm@2.2.0
enclave-vm@2.3.0
enclave-vm@2.4.0
enclave-vm@2.5.0
enclave-vm@2.6.0
enclave-vm@2.7.0
v1.*
v1.0.0
v1.1.0
v2.*
v2.0.0
v2.10.0
vectoriadb@2.*
vectoriadb@2.0.0
vectoriadb@2.0.1
vectoriadb@2.0.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25533.json"