SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can obtain the hosts Function constructor, which can be used to execute arbitrary code outside of the sandbox. This vulnerability is fixed in 0.8.29.
References
| Link | Resource |
|---|---|
| https://github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3 | Patch |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-58jh-xv4v-pcx4 | Exploit Vendor Advisory |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-58jh-xv4v-pcx4 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 20:16
Updated : 2026-02-18 14:33
NVD link : CVE-2026-25520
Mitre link : CVE-2026-25520
CVE.ORG link : CVE-2026-25520
JSON object : View
Products Affected
nyariv
- sandboxjs
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
