

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm…
Published:
13 January 2026 at 23:00:00
Alert date:
14 January 2026 at 01:01:17
Source:
nvd.nist.gov
Web Technologies, Security Tools
A critical sandbox escape vulnerability in enclave-vm prior to version 2.7.0 allows untrusted JavaScript code to execute arbitrary code in the host Node.js runtime. The vulnerability occurs when tool invocations fail and enclave-vm exposes a host-side Error object to sandboxed code. Attackers can traverse the prototype chain to reach the host Function constructor, enabling arbitrary JavaScript execution in the host context. This bypasses the sandbox entirely, granting access to sensitive resources including process.env, filesystem, and network. The vulnerability breaks enclave-vm's core security guarantee of isolating untrusted code and has been fixed in version 2.7.0.
Technical details
Mitigation steps:
Affected products:
Enclave
enclave-vm
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-22686
https://github.com/agentfront/enclave/commit/ed8bc438b2cd6e6f0b5f2de321e5be6f0169b5a1
https://github.com/agentfront/enclave/security/advisories/GHSA-7qm7-455j-5p63
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

