


Perceptive Security
SOC/SIEM Consultancy

SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `Sandbox…
Published:
27 januari 2026 om 23:00:00
Alert date:
28 januari 2026 om 01:03:02
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
SandboxJS versions prior to 0.8.26 contain a critical sandbox escape vulnerability allowing remote code execution. The flaw occurs because AsyncFunction, GeneratorFunction, and AsyncGeneratorFunction constructors were not properly isolated in the sandboxing mechanism. Attackers can access the native AsyncFunction constructor through the .constructor property of async function instances, bypassing sandbox restrictions. This enables creation of functions that execute in the global scope outside the sandbox context, providing full access to the host environment. The vulnerability is patched in version 0.8.26.
Technical details
Mitigation steps:
Affected products:
SandboxJS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-23830
https://github.com/nyariv/SandboxJS/commit/345aee6566e47979dee5c337b925b141e7f78ccd
https://github.com/nyariv/SandboxJS/security/advisories/GHSA-wxhw-j4hc-fmq6
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
