CVE-2026-34208
SandboxJS · SandboxJS
A sandbox escape in SandboxJS allows attackers to bypass global object protection by utilizing an exposed constructor path, enabling arbitrary property writes in the host environment.
Executive summary
A critical sandbox escape vulnerability in SandboxJS allows attackers to bypass security protections, enabling arbitrary code execution and persistence across sandbox instances.
Vulnerability
The library fails to sufficiently block access to the constructor property within the sandbox. Attackers can leverage this.constructor.call to write arbitrary properties into host global objects, effectively breaking the isolation boundary.
Business impact
This flaw permits an attacker to escape the intended sandbox isolation, which could lead to unauthorized access to host-level resources and sensitive memory. Given the CVSS score of 10.0, this represents the highest level of risk to applications relying on SandboxJS for secure code execution.
Remediation
Immediate Action: Update the SandboxJS library to version 0.8.36 or later immediately.
Proactive Monitoring: Review application logs for unusual global object modifications or unexpected cross-sandbox interaction patterns.
Compensating Controls: Ensure that applications utilizing sandboxing implement secondary defense-in-depth measures, such as limiting the privileges of the process running the sandbox.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
Given the critical CVSS rating, immediate remediation is required. Organizations using SandboxJS must prioritize upgrading to version 0.8.36 to ensure the integrity of their sandboxed environments and prevent potential host-level compromise.