CVE-2026-43997
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0.
Ver en NVDAnálisis
A critical sandbox escape vulnerability has been identified in the vm2 library for Node.js. Attackers can obtain host objects to bypass the sandbox and execute arbitrary code on the underlying system. If your stack relies on vm2 to run untrusted code, update to version 3.11.0 immediately.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HCWE-94EPSS
Sin puntaje EPSS aún (CVE muy reciente).
Descripción técnica
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0.