Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Posted on January 28, 2026January 28, 2026 By CWS

A vital sandbox escape vulnerability has been recognized in vm2. This extensively used Node.js library offers sandbox isolation for executing untrusted code.

The flaw, tracked as CVE-2026-22709 (GHSA-99p7-6v5w-7xg8), impacts all variations as much as and together with 3.10.0 and carries a CVSS v3.1 base rating of 10.0, indicating most severity.

The vulnerability stems from incomplete callback sanitization in Promise prototype dealing with.

Whereas the vm2 builders sanitized callbacks for localPromise.prototype.then, the sanitization doesn’t apply to globalPromise.prototype.then.

Since async features return world Promise objects moderately than native ones, attackers can bypass sandbox restrictions and acquire code execution privileges on the underlying host system.

VM2 Sandbox Vulnerability

The vulnerability exploits an asymmetry in callback sanitization throughout promise chains.

Researchers found that Promise.prototype.catch callbacks might be manipulated by means of error stack manipulation.

CVE IDPackageAffected VersionsCVSS ScoreVulnerability TypeAttack VectorCVE-2026-22709vm2 (npm)≤ 3.10.010.0Sandbox EscapeNetwork

By creating an error object with a symbolic title and triggering an async perform, an attacker positive factors entry to the Error constructor, which finally permits arbitrary code execution through the Operate constructor.

The assault chain leverages this development to instantiate a Operate object with arbitrary payload code.

In proof-of-concept demonstrations, attackers have efficiently executed system instructions resembling execSync() through entry to the child_process module, utterly circumventing the sandbox isolation layer.

VM2 maintainers launched model 3.10.2, a patched model, to deal with the flaw.

This replace correctly sanitizes Promise callbacks throughout each native and world prototype chains, closing the sandbox escape vector.

Organizations utilizing vm2 ought to instantly improve to model 3.10.2 or later.

The package deal co-founder, Patrik Šimek, revealed a GitHub advisory two days in the past, displaying energetic upkeep and a speedy response to the safety situation

Improvement groups counting on VM2 for code sandboxing ought to deal with this as a vital precedence.

Conduct fast stock assessments throughout growth and manufacturing environments to determine affected deployments.

Deploy model 3.10.2 by means of your package deal administration pipeline directly, and validate that no manufacturing situations stay on weak variations.

Till patching is full, contemplate limiting VM2 execution contexts to trusted code solely.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Critical, Library, Node.js, Run, Sandbox, Untrusted, VM2, Vulnerability

Post navigation

Previous Post: Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
Next Post: Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Related Posts

Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News
Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Cyber Security News
OpenVPN Vulnerability Exposes Linux, MacOS Systems To Script Injection Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark