CVE-2026-34217 PUBLISHED

SandboxJS has a Sandbox Escape via Prop Object Leak in New Handler

Assigner: GitHub_M
Reserved: 26.03.2026 Published: 06.04.2026 Updated: 06.04.2026

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor nyariv
Product SandboxJS
Versions
  • Version < 0.8.36 is affected

References

Problem Types

  • CWE-668: Exposure of Resource to Wrong Sphere CWE