Affected versions of safe-eval
are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
This code accesses the process object and calls .exit()
var safeEval = require('safe-eval');
safeEval("this.constructor.constructor('return process')().exit()");
Update to version 0.4.0 or later
{ "nvd_published_at": null, "cwe_ids": [ "CWE-610" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2020-06-16T22:01:17Z" }