Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Vulnerability / Open Supply
A crucial sandbox escape vulnerability has been disclosed within the common vm2 Node.js library that, if efficiently exploited, may permit attackers to run arbitrary code on the underlying working system.
The vulnerability, tracked as CVE-2026-22709, carries a CVSS rating of 9.8 out of 10.0 on the CVSS scoring system.
“In vm2 for model 3.10.0, Promise.prototype.then Promise.prototype.catch callback sanitization will be bypassed,” vm2 maintainer Patrik Simek mentioned. “This permits attackers to flee the sandbox and run arbitrary code.”
vm2 is a Node.js library used to run untrusted code inside a safe sandboxed atmosphere by intercepting and proxying JavaScript objects to stop sandboxed code from accessing the host atmosphere.

The newly found flaw stems from the library’s improper sanitization of Promise handlers, which creates an escape vector that ends in the execution of arbitrary code outdoors the sandbox boundaries.
“The crucial perception is that async features in JavaScript return `globalPromise` objects, not `localPromise` objects. Since `globalPromise.prototype.then` and `globalPromise.prototype.catch` aren’t correctly sanitized (not like `localPromise`),” Endor Labs researchers Peyton Kennedy and Cris Staicu mentioned.
Whereas CVE-2026-22709 has been addressed in vm2 model 3.10.2, it is the newest in a gentle stream of sandbox escapes which have plagued the library in recent times. This consists of CVE-2022-36067, CVE-2023-29017, CVE-2023-29199, CVE-2023-30547, CVE-2023-32314, CVE-2023-37466, and CVE-2023-37903.

The invention of CVE-2023-37903 in July 2023 additionally led Simek to announce that the undertaking was being discontinued. Nevertheless, these references have since been faraway from the newest README file obtainable on its GitHub repository. The Safety web page has additionally been up to date as of October 2025 to say that vm2 3.x variations are being actively maintained.
Nevertheless, vm2’s maintainer has additionally acknowledged that new bypasses will possible be found sooner or later, urging customers to be sure that they hold the library updated and contemplate different strong alternate options, reminiscent of isolated-vm, for stronger isolation ensures.

“As an alternative of counting on the problematic vm mannequin, the successor to vm2, isolated-vm depends on V8’s native Isolate interface, which presents a extra stable basis, however even then, the maintainers of vm2 stress the significance of isolation and really suggest Docker with logical separation between parts,” Semgrep mentioned.
In gentle of the criticality of the flaw, customers are beneficial to replace to the newest model (3.10.3), which comes with fixes for extra sandbox escapes.

The Hacker News Tags:Arbitrary, Code, Critical, Escape, Execution, Flaw, Node.js, Sandbox, VM2

Post navigation

Previous Post: Why We Can’t Let AI Take the Wheel of Cyber Defense
Next Post: Mesh Security Raises $12 Million for CSMA Platform

Related Posts

The Future of Cybersecurity Includes Non-Human Employees The Future of Cybersecurity Includes Non-Human Employees The Hacker News
Enhancing Mobile Security with Samsung Knox Enhancing Mobile Security with Samsung Knox The Hacker News
Understanding Help Desk Scams and How to Defend Your Organization Understanding Help Desk Scams and How to Defend Your Organization The Hacker News
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors The Hacker News
A New Approach to a Decade-Old Challenge A New Approach to a Decade-Old Challenge The Hacker News
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News