CVE-2026-44000
Description
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, a sandbox boundary violation in vm2 allows host object identity to cross into the sandbox through host Promise resolution. When a host-side Promise that resolves to a host object is exposed to the sandbox, the value delivered to the sandbox .then() callback preserves host identity. This allows the sandbox to interact with the host object directly, including performing identity checks using host-side WeakMap and mutating host object state from inside the sandbox. This behavior occurs because the Promise fulfillment wrapper uses ensureThis() instead of the stronger cross-realm conversion path (from() / proxy wrapping). If no prototype mapping is found, ensureThis() returns the original object. As a result, objects resolved by host Promises can cross the sandbox boundary without proper isolation. This vulnerability is fixed in 3.11.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vm2npm | < 3.11.0 | 3.11.0 |
Affected products
1- Range: <= 3.10.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/patriksimek/vm2/security/advisories/GHSA-mpf8-4hx2-7cjgnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-mpf8-4hx2-7cjgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-44000ghsaADVISORY
- github.com/patriksimek/vm2/releases/tag/v3.11.0ghsaWEB
News mentions
0No linked articles in our index yet.