CVE-2026-25881: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nyariv SandboxJS
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.prototype, Set.prototype) is placed into an array and retrieved, the isGlobal taint is stripped, permitting direct prototype mutation from within the sandbox. This results in persistent host-side prototype pollution and may enable RCE in applications that use polluted properties in sensitive sinks (example gadget: execSync(obj.cmd)). This vulnerability is fixed in 0.8.31.
CVE-2026-25881: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nyariv SandboxJS
Description
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.31, a sandbox escape vulnerability allows sandboxed code to mutate host built-in prototypes by laundering the isGlobal protection flag through array literal intermediaries. When a global prototype reference (e.g., Map.prototype, Set.prototype) is placed into an array and retrieved, the isGlobal taint is stripped, permitting direct prototype mutation from within the sandbox. This results in persistent host-side prototype pollution and may enable RCE in applications that use polluted properties in sensitive sinks (example gadget: execSync(obj.cmd)). This vulnerability is fixed in 0.8.31.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-06T21:08:39.129Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a52254b57a58fa1728462
Added to database: 2/9/2026, 9:31:17 PM
Last updated: 2/9/2026, 9:31:34 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25885: CWE-285: Improper Authorization in polarnl PolarLearn
CriticalCVE-2026-25880: CWE-426: Untrusted Search Path in sumatrapdfreader sumatrapdf
HighCVE-2026-25875: CWE-863: Incorrect Authorization in Praskla-Technology assessment-placipy
CriticalCVE-2026-25814: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Praskla-Technology assessment-placipy
CriticalCVE-2026-25813: CWE-532: Insertion of Sensitive Information into Log File in Praskla-Technology assessment-placipy
HighActions
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.