Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25586: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in nyariv SandboxJS

0
Critical
VulnerabilityCVE-2026-25586cvecve-2026-25586cwe-74
Published: Fri Feb 06 2026 (02/06/2026, 19:54:38 UTC)
Source: CVE Database V5
Vendor/Project: nyariv
Product: SandboxJS

Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked prototype properties, enabling host Object.prototype pollution and persistent cross-sandbox impact. This vulnerability is fixed in 0.8.29.

AI-Powered Analysis

AILast updated: 02/06/2026, 20:15:05 UTC

Technical Analysis

CVE-2026-25586 is a critical injection vulnerability classified under CWE-74 affecting the nyariv SandboxJS library, a JavaScript sandboxing tool designed to isolate and securely execute untrusted code. Prior to version 0.8.29, SandboxJS improperly neutralizes special elements in output used by downstream components, specifically by allowing sandbox escape through prototype pollution. The root cause is the ability to shadow the hasOwnProperty method on sandbox objects, which disables the enforcement of a prototype whitelist during property access. This flaw permits attackers to access and manipulate the __proto__ property and other blocked prototype properties, effectively polluting the host environment's Object.prototype. Such pollution can lead to persistent cross-sandbox contamination, breaking the isolation guarantees of the sandbox and enabling attackers to execute arbitrary code or escalate privileges within the host environment. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. The CVSS 3.1 base score is 10.0, reflecting the critical nature of the flaw with complete impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on February 6, 2026, and fixed in SandboxJS version 0.8.29. No known exploits have been reported in the wild yet, but the potential for severe damage is significant given the nature of the vulnerability and the widespread use of JavaScript sandboxing in modern web applications and services.

Potential Impact

For European organizations, the impact of CVE-2026-25586 can be severe, especially for those relying on SandboxJS for secure execution of untrusted JavaScript code, such as SaaS providers, cloud platforms, and web application developers. Exploitation could lead to full compromise of the sandbox environment, allowing attackers to execute arbitrary code on the host system, access sensitive data, or disrupt services. This can result in data breaches, loss of customer trust, regulatory penalties under GDPR, and operational downtime. Organizations using multi-tenant environments or microservices architectures that depend on sandboxing for isolation are particularly vulnerable to cross-tenant attacks. The critical severity and ease of exploitation without authentication increase the urgency for European entities to address this vulnerability promptly. Additionally, the persistent nature of the Object.prototype pollution can complicate detection and remediation efforts, potentially allowing attackers to maintain long-term access.

Mitigation Recommendations

European organizations should immediately upgrade all instances of SandboxJS to version 0.8.29 or later to remediate this vulnerability. In addition to patching, organizations should conduct thorough code reviews and security audits of their sandboxing implementations to ensure no other prototype pollution or sandbox escape vectors exist. Implement runtime monitoring and anomaly detection focused on prototype chain modifications and unusual property accesses to detect potential exploitation attempts. Employ defense-in-depth strategies such as strict Content Security Policies (CSP), limiting the privileges of sandboxed code, and isolating critical services to minimize the blast radius of any successful attack. For environments where immediate patching is not feasible, consider disabling or restricting the use of SandboxJS or replacing it with alternative sandboxing solutions with verified security. Regularly update threat intelligence feeds and monitor for emerging exploits targeting this vulnerability. Finally, ensure incident response plans include scenarios involving sandbox escapes and prototype pollution attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.715Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69864849f9fa50a62f2e0357

Added to database: 2/6/2026, 8:00:09 PM

Last enriched: 2/6/2026, 8:15:05 PM

Last updated: 2/6/2026, 9:08:34 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats