Affected versions of safe-eval are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
This code accesses the process object and calls .exit()
var safeEval = require('safe-eval');
safeEval("this.constructor.constructor('return process')().exit()");
Update to version 0.4.0 or later
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-610"
],
"github_reviewed_at": "2020-06-16T22:01:17Z",
"severity": "CRITICAL",
"github_reviewed": true
}