Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nyariv/sandboxjs
  4. ›
  5. CVE-2026-34208

CVE-2026-34208: SandboxJS: Sandbox integrity escape

April 3, 2026 (updated April 6, 2026)

SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process.

References

  • github.com/advisories/GHSA-2gg9-6p7w-6cpj
  • github.com/nyariv/SandboxJS
  • github.com/nyariv/SandboxJS/security/advisories/GHSA-2gg9-6p7w-6cpj
  • nvd.nist.gov/vuln/detail/CVE-2026-34208

Code Behaviors & Features

Detect and mitigate CVE-2026-34208 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.8.36

Fixed versions

  • 0.8.36

Solution

Upgrade to version 0.8.36 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-693: Protection Mechanism Failure
  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Source file

npm/@nyariv/sandboxjs/CVE-2026-34208.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:42 +0000.