Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Vulnerability / Open Supply
A crucial sandbox escape vulnerability has been disclosed within the common vm2 Node.js library that, if efficiently exploited, may permit attackers to run arbitrary code on the underlying working system.
The vulnerability, tracked as CVE-2026-22709, carries a CVSS rating of 9.8 out of 10.0 on the CVSS scoring system.
“In vm2 for model 3.10.0, Promise.prototype.then Promise.prototype.catch callback sanitization will be bypassed,” vm2 maintainer Patrik Simek mentioned. “This permits attackers to flee the sandbox and run arbitrary code.”
vm2 is a Node.js library used to run untrusted code inside a safe sandboxed atmosphere by intercepting and proxying JavaScript objects to stop sandboxed code from accessing the host atmosphere.

The newly found flaw stems from the library’s improper sanitization of Promise handlers, which creates an escape vector that ends in the execution of arbitrary code outdoors the sandbox boundaries.
“The crucial perception is that async features in JavaScript return `globalPromise` objects, not `localPromise` objects. Since `globalPromise.prototype.then` and `globalPromise.prototype.catch` aren’t correctly sanitized (not like `localPromise`),” Endor Labs researchers Peyton Kennedy and Cris Staicu mentioned.
Whereas CVE-2026-22709 has been addressed in vm2 model 3.10.2, it is the newest in a gentle stream of sandbox escapes which have plagued the library in recent times. This consists of CVE-2022-36067, CVE-2023-29017, CVE-2023-29199, CVE-2023-30547, CVE-2023-32314, CVE-2023-37466, and CVE-2023-37903.

The invention of CVE-2023-37903 in July 2023 additionally led Simek to announce that the undertaking was being discontinued. Nevertheless, these references have since been faraway from the newest README file obtainable on its GitHub repository. The Safety web page has additionally been up to date as of October 2025 to say that vm2 3.x variations are being actively maintained.
Nevertheless, vm2’s maintainer has additionally acknowledged that new bypasses will possible be found sooner or later, urging customers to be sure that they hold the library updated and contemplate different strong alternate options, reminiscent of isolated-vm, for stronger isolation ensures.

“As an alternative of counting on the problematic vm mannequin, the successor to vm2, isolated-vm depends on V8’s native Isolate interface, which presents a extra stable basis, however even then, the maintainers of vm2 stress the significance of isolation and really suggest Docker with logical separation between parts,” Semgrep mentioned.
In gentle of the criticality of the flaw, customers are beneficial to replace to the newest model (3.10.3), which comes with fixes for extra sandbox escapes.

The Hacker News Tags:Arbitrary, Code, Critical, Escape, Execution, Flaw, Node.js, Sandbox, VM2

Post navigation

Previous Post: Why We Can’t Let AI Take the Wheel of Cyber Defense
Next Post: Mesh Security Raises $12 Million for CSMA Platform

Related Posts

PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse The Hacker News
Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits The Hacker News
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark