top of page
perceptive_background_267k.jpg

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `Sandbox…

Published:

27 January 2026 at 23:00:00

Alert date:

28 January 2026 at 01:03:02

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

SandboxJS versions prior to 0.8.26 contain a critical sandbox escape vulnerability allowing remote code execution. The flaw occurs because AsyncFunction, GeneratorFunction, and AsyncGeneratorFunction constructors were not properly isolated in the sandboxing mechanism. Attackers can access the native AsyncFunction constructor through the .constructor property of async function instances, bypassing sandbox restrictions. This enables creation of functions that execute in the global scope outside the sandbox context, providing full access to the host environment. The vulnerability is patched in version 0.8.26.

Technical details

Mitigation steps:

Affected products:

SandboxJS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page