CVE-2026-44009

Node.js (OpenJS Foundation) · vm2

The vm2 sandbox library for Node.js is vulnerable to sandbox escape, potentially allowing arbitrary command execution on the host system.

Executive summary

A critical sandbox escape vulnerability in the vm2 library for Node.js poses a significant risk of arbitrary code execution on host systems.

Vulnerability

This is a sandbox breakout vulnerability that allows an attacker to bypass the isolation mechanisms of the vm2 environment, leading to full system compromise. The vulnerability can be triggered by an unauthenticated attacker providing malicious input to the sandbox.

Business impact

With a CVSS score of 9.8, this vulnerability represents a critical risk to business continuity and data integrity. Successful exploitation allows an attacker to break out of the intended sandbox environment and execute arbitrary commands on the underlying host, potentially leading to unauthorized access to sensitive data, system takeover, or the deployment of ransomware.

Remediation

Immediate Action: Update the vm2 library to version 3.11.2 or later immediately to apply the necessary security patches.

Proactive Monitoring: Monitor server logs for unusual process execution or attempts to access restricted file paths originating from Node.js applications.

Compensating Controls: Implement strict containerization and principle-of-least-privilege policies for all Node.js environments to limit the blast radius if the sandbox is compromised.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Given the critical nature of sandbox escapes, organizations utilizing vm2 must prioritize this update. Ensure that all dependencies are audited and that the patching process is completed across all production and development environments to prevent potential host-level exploitation.