top of page
perceptive_background_267k.jpg

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.7.0, there is a critical sandbox escape vulnerability in enclave-vm…

Published:

13 January 2026 at 23:00:00

Alert date:

14 January 2026 at 01:01:17

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Security Tools

A critical sandbox escape vulnerability in enclave-vm prior to version 2.7.0 allows untrusted JavaScript code to execute arbitrary code in the host Node.js runtime. The vulnerability occurs when tool invocations fail and enclave-vm exposes a host-side Error object to sandboxed code. Attackers can traverse the prototype chain to reach the host Function constructor, enabling arbitrary JavaScript execution in the host context. This bypasses the sandbox entirely, granting access to sensitive resources including process.env, filesystem, and network. The vulnerability breaks enclave-vm's core security guarantee of isolating untrusted code and has been fixed in version 2.7.0.

Technical details

Mitigation steps:

Affected products:

Enclave
enclave-vm

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page