Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @nyariv/sandboxjs
  4. ›
  5. CVE-2026-25881

CVE-2026-25881: @nyariv/sandboxjs has host prototype pollution from sandbox via array intermediary (sandbox escape)

February 10, 2026

A sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.prototype, Set.prototype) is placed into an array and retrieved, the isGlobal taint is stripped, permitting direct prototype mutation from within the sandbox. This results in persistent host-side prototype pollution and may enable RCE in applications that use polluted properties in sensitive sinks (example gadget: execSync(obj.cmd)).

References

  • github.com/advisories/GHSA-ww7g-4gwx-m7wj
  • github.com/nyariv/SandboxJS
  • github.com/nyariv/SandboxJS/commit/f369f8db26649f212a6a9a2e7a1624cb2f705b53
  • github.com/nyariv/SandboxJS/security/advisories/GHSA-ww7g-4gwx-m7wj
  • nvd.nist.gov/vuln/detail/CVE-2026-25881

Code Behaviors & Features

Detect and mitigate CVE-2026-25881 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.8.31

Fixed versions

  • 0.8.31

Solution

Upgrade to version 0.8.31 or above.

Impact 9 CRITICAL

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/@nyariv/sandboxjs/CVE-2026-25881.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:35 +0000.