CVE-2026-26332
Node.js (vm2) · vm2
A vulnerability involving `SuppressedError` in the vm2 library allows attackers to escape the sandbox and execute arbitrary code on the host system.
Executive summary
A critical sandbox breakout vulnerability in vm2 allows attackers to leverage SuppressedError to execute arbitrary code on the host.
Vulnerability
The SuppressedError object in the vm2 environment can be manipulated to facilitate a sandbox escape. By exploiting this, an attacker can move outside the restricted environment and execute arbitrary code on the host.
Business impact
A CVSS score of 9.8 reflects the high severity of this sandbox escape. Exploitation could allow an attacker to gain full control over the host system, leading to complete data compromise and potential disruption of critical business processes.
Remediation
Immediate Action: Update the vm2 dependency to version 3.11.0 or later to address this breakout vulnerability.
Proactive Monitoring: Monitor application logs for unexpected error patterns or unusual code execution sequences.
Compensating Controls: Run the Node.js application with minimal system privileges and use containerization to restrict access to the underlying host resources.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The continued discovery of sandbox escapes in vm2 underscores the difficulty of maintaining a secure JavaScript sandbox. Updating the library is mandatory, but organizations should also assess the necessity of running untrusted code and consider more secure architectural alternatives.