Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Posted on January 28, 2026January 28, 2026 By CWS

A vital sandbox escape vulnerability has been recognized in vm2. This extensively used Node.js library offers sandbox isolation for executing untrusted code.

The flaw, tracked as CVE-2026-22709 (GHSA-99p7-6v5w-7xg8), impacts all variations as much as and together with 3.10.0 and carries a CVSS v3.1 base rating of 10.0, indicating most severity.

The vulnerability stems from incomplete callback sanitization in Promise prototype dealing with.

Whereas the vm2 builders sanitized callbacks for localPromise.prototype.then, the sanitization doesn’t apply to globalPromise.prototype.then.

Since async features return world Promise objects moderately than native ones, attackers can bypass sandbox restrictions and acquire code execution privileges on the underlying host system.

VM2 Sandbox Vulnerability

The vulnerability exploits an asymmetry in callback sanitization throughout promise chains.

Researchers found that Promise.prototype.catch callbacks might be manipulated by means of error stack manipulation.

CVE IDPackageAffected VersionsCVSS ScoreVulnerability TypeAttack VectorCVE-2026-22709vm2 (npm)≤ 3.10.010.0Sandbox EscapeNetwork

By creating an error object with a symbolic title and triggering an async perform, an attacker positive factors entry to the Error constructor, which finally permits arbitrary code execution through the Operate constructor.

The assault chain leverages this development to instantiate a Operate object with arbitrary payload code.

In proof-of-concept demonstrations, attackers have efficiently executed system instructions resembling execSync() through entry to the child_process module, utterly circumventing the sandbox isolation layer.

VM2 maintainers launched model 3.10.2, a patched model, to deal with the flaw.

This replace correctly sanitizes Promise callbacks throughout each native and world prototype chains, closing the sandbox escape vector.

Organizations utilizing vm2 ought to instantly improve to model 3.10.2 or later.

The package deal co-founder, Patrik Šimek, revealed a GitHub advisory two days in the past, displaying energetic upkeep and a speedy response to the safety situation

Improvement groups counting on VM2 for code sandboxing ought to deal with this as a vital precedence.

Conduct fast stock assessments throughout growth and manufacturing environments to determine affected deployments.

Deploy model 3.10.2 by means of your package deal administration pipeline directly, and validate that no manufacturing situations stay on weak variations.

Till patching is full, contemplate limiting VM2 execution contexts to trusted code solely.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Critical, Library, Node.js, Run, Sandbox, Untrusted, VM2, Vulnerability

Post navigation

Previous Post: Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer

Related Posts

NAKIVO v11.1 Introduces Stronger Protection for Virtual Environments Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
Reflectiz Now Available on the Datadog Marketplace Cyber Security News
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
Claude Opus 4.5 Now Integrated with GitHub Copilot Cyber Security News
Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark