

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm…
Published:
13 January 2026 at 23:00:00
Alert date:
14 January 2026 at 17:02:19
Source:
nvd.nist.gov
Web Technologies, Security Tools
Critical sandbox escape vulnerability in enclave-vm (versions prior to 2.7.0) allows untrusted JavaScript code to execute arbitrary code in the host Node.js runtime. The vulnerability occurs when tool invocation fails and exposes a host-side Error object to sandboxed code. Attackers can traverse the Error object's prototype chain to reach the host Function constructor, enabling arbitrary JavaScript compilation and execution in the host context. This completely bypasses the sandbox security model and grants access to sensitive resources including process environment, filesystem, and network. The vulnerability has been fixed in version 2.7.0.
Technical details
Mitigation steps:
Affected products:
Enclave
enclave-vm
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22686
https://github.com/agentfront/enclave/commit/ed8bc438b2cd6e6f0b5f2de321e5be6f0169b5a1
https://github.com/agentfront/enclave/security/advisories/GHSA-7qm7-455j-5p63
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

