CVE-2026-27597
Enclave · enclave-vm
A security boundary escape vulnerability in the Enclave JavaScript sandbox core allows attackers to bypass restrictions and achieve remote code execution (RCE).
Executive summary
A critical vulnerability in Enclave allows for a complete escape of the JavaScript sandbox, enabling unauthorized remote code execution on the host system.
Vulnerability
This flaw exists within the @enclave-vm/core component, where insufficient isolation allows code to break out of the intended sandbox environment. An attacker capable of submitting code for execution can leverage this escape to execute arbitrary commands with the privileges of the sandbox process.
Business impact
Successful exploitation of this vulnerability results in full system compromise, as the primary security control of the product—the sandbox—is rendered ineffective. Given the CVSS score of 10.0, this represents the highest possible risk, potentially leading to total loss of confidentiality, integrity, and availability of the host infrastructure and sensitive AI agent data.
Remediation
Immediate Action: Administrators must upgrade the Enclave environment to version 2.11.1 or later immediately to restore sandbox integrity.
Proactive Monitoring: Implement strict logging of sandbox execution attempts and monitor for unusual system calls or outbound network connections originating from the sandbox process.
Compensating Controls: Restrict the permissions of the user account running the Enclave process to the absolute minimum required to limit the impact of a potential escape.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability represents a total failure of the product's primary security function. Organizations utilizing Enclave for AI agent execution must prioritize the application of the version 2.11.1 patch immediately. Failure to do so leaves the underlying infrastructure exposed to complete remote takeover.