SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.
References
| Link | Resource |
|---|---|
| https://github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3 | Patch |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp | Exploit Vendor Advisory |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-06 20:16
Updated : 2026-02-18 14:31
NVD link : CVE-2026-25587
Mitre link : CVE-2026-25587
CVE.ORG link : CVE-2026-25587
JSON object : View
Products Affected
nyariv
- sandboxjs
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
