top of page
perceptive_background_267k.jpg

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `Sandbox…

Published:

27 januari 2026 om 23:00:00

Alert date:

28 januari 2026 om 01:03:02

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

SandboxJS versions prior to 0.8.26 contain a critical sandbox escape vulnerability allowing remote code execution. The flaw occurs because AsyncFunction, GeneratorFunction, and AsyncGeneratorFunction constructors were not properly isolated in the sandboxing mechanism. Attackers can access the native AsyncFunction constructor through the .constructor property of async function instances, bypassing sandbox restrictions. This enables creation of functions that execute in the global scope outside the sandbox context, providing full access to the host environment. The vulnerability is patched in version 0.8.26.

Technical details

Mitigation steps:

Affected products:

SandboxJS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page