Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nyariv/sandboxjs
  4. ›
  5. CVE-2026-25586

CVE-2026-25586: @nyariv/sandboxjs has Sandbox Escape via Prototype `Whitelist` Bypass and Host Prototype Pollution

February 5, 2026 (updated February 6, 2026)

A sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked prototype properties, enabling host Object.prototype pollution and persistent cross-sandbox impact.

The issue was reproducible on Node v23.9.0 using the project’s current build output. The bypass works with default Sandbox configuration and does not require custom globals or whitelists.

References

  • github.com/advisories/GHSA-jjpw-65fv-8g48
  • github.com/nyariv/SandboxJS
  • github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3
  • github.com/nyariv/SandboxJS/security/advisories/GHSA-jjpw-65fv-8g48
  • nvd.nist.gov/vuln/detail/CVE-2026-25586

Code Behaviors & Features

Detect and mitigate CVE-2026-25586 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.8.29

Fixed versions

  • 0.8.29

Solution

Upgrade to version 0.8.29 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Source file

npm/@nyariv/sandboxjs/CVE-2026-25586.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 12:17:32 +0000.