VYPR

npm package

@nyariv/sandboxjs

pkg:npm/%40nyariv/sandboxjs

Vulnerabilities (14)

  • CVE-2026-43898criMay 11, 2026
    affected < 0.9.6fixed 0.9.6

    ### Summary Sandbox-defined functions expose `Function.caller`, allowing sandboxed code to recover the internal `LispType.Call` runtime callback. That callback can then be invoked with attacker-controlled fake context and obj values to extract blocked host statics, recover the re

  • CVE-2026-34217HigApr 6, 2026
    affected < 0.8.36fixed 0.8.36

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the sc

  • CVE-2026-34211HigApr 6, 2026
    affected < 0.8.36fixed 0.8.36

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandboxjs parser contains unbounded recursion in the restOfExp function and the lispify/lispifyExpr call chain. An attacker can crash any Node.js process that parses untrusted input by supplying deeply nes

  • CVE-2026-34208CriApr 6, 2026
    affected < 0.8.36fixed 0.8.36

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Be

  • CVE-2026-32723Mar 18, 2026
    affected < 0.8.35fixed 0.8.35

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers have an execution-quota bypass. A global tick state (`currentTicks.current`) is shared between sandboxes. Timer string handlers are compiled at execution time using that global tick state rather than

  • CVE-2026-26954Mar 13, 2026
    affected < 0.8.34fixed 0.8.34

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Function} where p is any constructi

  • CVE-2026-25881Feb 9, 2026
    affected < 0.8.31fixed 0.8.31

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.pro

  • CVE-2026-25586Feb 6, 2026
    affected < 0.8.29fixed 0.8.29

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked proto

  • CVE-2026-25520Feb 6, 2026
    affected < 0.8.29fixed 0.8.29

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can obtain the hosts Function constru

  • CVE-2026-25587Feb 6, 2026
    affected < 0.8.29fixed 0.8.29

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.

  • CVE-2026-25641Feb 6, 2026
    affected < 0.8.29fixed 0.8.29

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there is a sandbox escape vulnerability due to a mismatch between the key on which the validation is performed and the key used for accessing properties. Even though the key used in property accesses is annotated as s

  • CVE-2026-25142Feb 2, 2026
    affected < 0.8.27fixed 0.8.27

    SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27.

  • CVE-2026-23830Jan 27, 2026
    affected < 0.8.26fixed 0.8.26

    SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Function` constructor with a safe, sa

  • CVE-2025-34146HigJul 31, 2025
    affected < 0.8.24fixed 0.8.24

    A prototype pollution vulnerability exists in @nyariv/sandboxjs versions <= 0.8.23, allowing attackers to inject arbitrary properties into Object.prototype via crafted JavaScript code. This can result in a denial-of-service (DoS) condition or, under certain conditions, escape the