Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities Expose Node.js vm2 to Code Execution

Critical Vulnerabilities Expose Node.js vm2 to Code Execution

Posted on May 7, 2026 By CWS

The popular Node.js library, vm2, has been found to have 11 critical vulnerabilities that threaten the integrity of applications dependent on it. These vulnerabilities grant attackers the ability to execute untrusted code, posing serious risks to systems.

Impact of the Vulnerabilities

All versions of vm2 up to 3.11.1 are affected, allowing attackers to break out of the sandbox environment and execute commands on the host system. Alarmingly, two of these vulnerabilities remain without patches, leaving systems vulnerable to remote code execution.

Vm2 is a Node.js package designed to execute untrusted JavaScript in a confined setting. Its usage spans various platforms, including code execution environments, continuous integration pipelines, and multi-tenant cloud services.

The core security model of vm2 is its ability to contain malicious code, protecting the host system. However, researchers have unveiled flaws in this model through eleven different techniques, revealing significant security weaknesses.

Details of Severe Vulnerabilities

Among the most critical issues is CVE-2026-24118, exploiting the __lookupGetter__ to escape the sandbox. Another, CVE-2026-24120, circumvents Promise species protections, enabling command execution via child_process.execSync.

Additionally, CVE-2026-24781 manipulates Node.js’ util module to access host objects, bypassing vm2’s proxy defenses. Meanwhile, CVE-2026-26332 and CVE-2026-26956 utilize new JavaScript features to expose vulnerabilities in vm2’s isolation layers.

Other flaws, such as CVE-2026-43997 and CVE-2026-44006, exploit prototype chains to breach sandbox security. CVE-2026-43999 leverages module loading logic to bypass restrictions, while CVE-2026-44005 demonstrates prototype pollution risks.

Recommendations for Mitigation

To address these vulnerabilities, it is crucial for operators to update vm2 to version 3.11.1. This update resolves the patched vulnerabilities, providing enhanced security for affected systems.

However, for the unpatched vulnerabilities, CVE-2026-44008 and CVE-2026-44009, a more cautious approach is advised. Teams should consider alternative sandboxing solutions, such as Docker or gVisor, which offer kernel-level isolation.

Developers are also advised to avoid certain configurations, including the nesting: true option and wildcard module inclusions, to minimize security risks.

The extensive range of these vulnerabilities highlights the limitations of vm2’s JavaScript-only isolation model for high-security applications. Organizations should reassess their use of vm2 in critical environments.

For ongoing updates in cybersecurity, follow us on Google News, LinkedIn, and X. Reach out to have your stories featured with us.

Cyber Security News Tags:code execution, CVE, Cybersecurity, JavaScript, Node.js, Patches, Sandbox, Security, Technology, VM2, Vulnerabilities

Post navigation

Previous Post: Gemini CLI Flaw Risked Severe Supply Chain Attack
Next Post: Cybersecurity Threats 2026: Key Insights and Alerts

Related Posts

Feiniu NAS Devices Targeted in Major Botnet Attack Feiniu NAS Devices Targeted in Major Botnet Attack Cyber Security News
Strengthening Security Measures In Digital Advertising Platforms Strengthening Security Measures In Digital Advertising Platforms Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs Cyber Security News
Free Converter Apps that Convert your Clean System to Infected in Seconds Free Converter Apps that Convert your Clean System to Infected in Seconds Cyber Security News
Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome 148 Launches with Key Security Enhancements
  • Critical PAN-OS Flaw Exploited for Root Access
  • Critical Redis Flaws Expose Systems to Remote Attacks
  • AI Tools Pose New Supply Chain Risks, Researchers Warn
  • Enhancing Incident Response: Key Operational Essentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome 148 Launches with Key Security Enhancements
  • Critical PAN-OS Flaw Exploited for Root Access
  • Critical Redis Flaws Expose Systems to Remote Attacks
  • AI Tools Pose New Supply Chain Risks, Researchers Warn
  • Enhancing Incident Response: Key Operational Essentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark