CVE-2026-25641

Source
https://cve.org/CVERecord?id=CVE-2026-25641
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25641.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25641
Aliases
Published
2026-02-06T19:50:11.634Z
Modified
2026-03-13T04:11:01.152134Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
SandboxJS has a sandbox escape via TOCTOU bug on keys in property accesses
Details

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in property accesses is annotated as string, this is never enforced. So, attackers can pass malicious objects that coerce to different string values when used, e.g., one for the time the key is sanitized using hasOwnProperty(key) and a different one for when the key is used for the actual property access. This vulnerability is fixed in 0.8.29.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-367"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25641.json"
}
References

Affected packages

Git / github.com/nyariv/sandboxjs

Affected ranges

Type
GIT
Repo
https://github.com/nyariv/sandboxjs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.5.0
0.5.2
0.5.3
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.8.0
0.8.1
0.8.10
0.8.11
0.8.12
0.8.14
0.8.15
0.8.15.1
0.8.16
0.8.17
0.8.18
0.8.19
0.8.2
0.8.20
0.8.21
0.8.22
0.8.23
0.8.23-1
0.8.23.2
0.8.23.3
0.8.24
0.8.24-1
0.8.24-2
0.8.27
0.8.28
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
v0.*
v0.8.28

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25641.json"