top of page
perceptive_background_267k.jpg

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm…

Published:

13 January 2026 at 23:00:00

Alert date:

14 January 2026 at 17:02:19

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Security Tools

Critical sandbox escape vulnerability in enclave-vm (versions prior to 2.7.0) allows untrusted JavaScript code to execute arbitrary code in the host Node.js runtime. The vulnerability occurs when tool invocation fails and exposes a host-side Error object to sandboxed code. Attackers can traverse the Error object's prototype chain to reach the host Function constructor, enabling arbitrary JavaScript compilation and execution in the host context. This completely bypasses the sandbox security model and grants access to sensitive resources including process environment, filesystem, and network. The vulnerability has been fixed in version 2.7.0.

Technical details

Mitigation steps:

Affected products:

Enclave
enclave-vm

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page