CVE-2026-25881

Source
https://cve.org/CVERecord?id=CVE-2026-25881
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25881.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25881
Aliases
Published
2026-02-09T21:12:58.981Z
Modified
2026-02-20T06:34:03.082963Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
@nyariv/sandboxjs has host prototype pollution from sandbox via array intermediary (sandbox escape)
Details

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.prototype, Set.prototype) is placed into an array and retrieved, the isGlobal taint is stripped, permitting direct prototype mutation from within the sandbox. This results in persistent host-side prototype pollution and may enable RCE in applications that use polluted properties in sensitive sinks (example gadget: execSync(obj.cmd)). This vulnerability is fixed in 0.8.31.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1321"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25881.json"
}
References

Affected packages

Git / github.com/nyariv/sandboxjs

Affected ranges

Type
GIT
Repo
https://github.com/nyariv/sandboxjs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.5.0
0.5.2
0.5.3
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.8.0
0.8.1
0.8.10
0.8.11
0.8.12
0.8.14
0.8.15
0.8.15.1
0.8.16
0.8.17
0.8.18
0.8.19
0.8.2
0.8.20
0.8.21
0.8.22
0.8.23
0.8.23-1
0.8.23.2
0.8.23.3
0.8.24
0.8.24-1
0.8.24-2
0.8.27
0.8.28
0.8.29
0.8.3
0.8.30
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
v0.*
v0.8.28

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25881.json"