CVE-2026-25881: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nyariv SandboxJS
CVE-2026-25881 is a critical prototype pollution vulnerability in SandboxJS versions prior to 0. 8. 31. It allows sandboxed JavaScript code to escape isolation by mutating host built-in prototypes such as Map. prototype or Set. prototype. This occurs because the isGlobal protection flag is improperly stripped when global prototype references are passed through array literals, enabling persistent prototype pollution. Exploiting this flaw can lead to remote code execution (RCE) if polluted properties are used in sensitive operations like execSync. The vulnerability has a CVSS score of 9. 1, indicating high severity, and affects applications relying on SandboxJS for secure code execution.
AI Analysis
Technical Summary
SandboxJS is a JavaScript sandboxing library designed to safely execute untrusted code by isolating it from the host environment. However, versions prior to 0.8.31 contain a critical vulnerability (CVE-2026-25881) classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes, or prototype pollution). The vulnerability arises because the sandbox’s protection mechanism, which uses an isGlobal taint flag to prevent sandboxed code from modifying host global prototypes, can be bypassed. Specifically, when a global prototype reference (e.g., Map.prototype or Set.prototype) is placed inside an array literal and then retrieved, the isGlobal flag is stripped. This allows sandboxed code to directly mutate these prototypes, leading to persistent pollution of the host environment’s prototypes. Prototype pollution can alter the behavior of all objects inheriting from the polluted prototype, potentially causing unexpected behavior or security issues. In this case, the polluted prototypes can be leveraged to execute arbitrary code on the host system, for example, by manipulating objects passed to sensitive functions like execSync that execute shell commands. The vulnerability does not require authentication or user interaction and can be exploited remotely if untrusted code is executed within the vulnerable SandboxJS environment. The CVSS 3.1 score of 9.1 reflects the critical impact on confidentiality, integrity, and availability, with network attack vector and no privileges required. Although no known exploits are reported in the wild yet, the severity and ease of exploitation make this a significant threat. The issue is resolved in SandboxJS version 0.8.31, which properly maintains the isGlobal taint when handling prototype references.
Potential Impact
For European organizations, this vulnerability poses a severe risk especially for those using SandboxJS to execute third-party or untrusted JavaScript code in web applications, serverless functions, or microservices. Successful exploitation can lead to remote code execution on critical infrastructure, compromising confidentiality, integrity, and availability of systems and data. This can result in data breaches, service disruptions, and lateral movement within networks. Industries such as finance, healthcare, and government, which often rely on sandboxing for secure code execution, are particularly at risk. The persistent nature of prototype pollution means that even after the initial exploit, the polluted environment can cause ongoing security issues and unpredictable application behavior. Additionally, the ability to execute arbitrary commands via execSync or similar functions can lead to full system compromise. Given the high CVSS score and the critical nature of the vulnerability, organizations face a substantial threat if they do not promptly update or mitigate the issue.
Mitigation Recommendations
1. Immediately upgrade all instances of SandboxJS to version 0.8.31 or later, where the vulnerability is fixed. 2. Audit all applications and services that use SandboxJS to identify and isolate vulnerable versions. 3. Implement strict input validation and sanitization for any code or data executed within SandboxJS to reduce the risk of malicious payloads. 4. Employ runtime monitoring and anomaly detection to identify unusual prototype modifications or suspicious execSync usage. 5. Restrict the use of sensitive functions like execSync within sandboxed environments or replace them with safer alternatives. 6. Use additional sandboxing or containerization layers to limit the impact of potential escapes. 7. Conduct regular security reviews and penetration testing focused on prototype pollution and sandbox escape vectors. 8. Educate developers about secure coding practices related to prototype pollution and sandbox usage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25881: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nyariv SandboxJS
Description
CVE-2026-25881 is a critical prototype pollution vulnerability in SandboxJS versions prior to 0. 8. 31. It allows sandboxed JavaScript code to escape isolation by mutating host built-in prototypes such as Map. prototype or Set. prototype. This occurs because the isGlobal protection flag is improperly stripped when global prototype references are passed through array literals, enabling persistent prototype pollution. Exploiting this flaw can lead to remote code execution (RCE) if polluted properties are used in sensitive operations like execSync. The vulnerability has a CVSS score of 9. 1, indicating high severity, and affects applications relying on SandboxJS for secure code execution.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
SandboxJS is a JavaScript sandboxing library designed to safely execute untrusted code by isolating it from the host environment. However, versions prior to 0.8.31 contain a critical vulnerability (CVE-2026-25881) classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes, or prototype pollution). The vulnerability arises because the sandbox’s protection mechanism, which uses an isGlobal taint flag to prevent sandboxed code from modifying host global prototypes, can be bypassed. Specifically, when a global prototype reference (e.g., Map.prototype or Set.prototype) is placed inside an array literal and then retrieved, the isGlobal flag is stripped. This allows sandboxed code to directly mutate these prototypes, leading to persistent pollution of the host environment’s prototypes. Prototype pollution can alter the behavior of all objects inheriting from the polluted prototype, potentially causing unexpected behavior or security issues. In this case, the polluted prototypes can be leveraged to execute arbitrary code on the host system, for example, by manipulating objects passed to sensitive functions like execSync that execute shell commands. The vulnerability does not require authentication or user interaction and can be exploited remotely if untrusted code is executed within the vulnerable SandboxJS environment. The CVSS 3.1 score of 9.1 reflects the critical impact on confidentiality, integrity, and availability, with network attack vector and no privileges required. Although no known exploits are reported in the wild yet, the severity and ease of exploitation make this a significant threat. The issue is resolved in SandboxJS version 0.8.31, which properly maintains the isGlobal taint when handling prototype references.
Potential Impact
For European organizations, this vulnerability poses a severe risk especially for those using SandboxJS to execute third-party or untrusted JavaScript code in web applications, serverless functions, or microservices. Successful exploitation can lead to remote code execution on critical infrastructure, compromising confidentiality, integrity, and availability of systems and data. This can result in data breaches, service disruptions, and lateral movement within networks. Industries such as finance, healthcare, and government, which often rely on sandboxing for secure code execution, are particularly at risk. The persistent nature of prototype pollution means that even after the initial exploit, the polluted environment can cause ongoing security issues and unpredictable application behavior. Additionally, the ability to execute arbitrary commands via execSync or similar functions can lead to full system compromise. Given the high CVSS score and the critical nature of the vulnerability, organizations face a substantial threat if they do not promptly update or mitigate the issue.
Mitigation Recommendations
1. Immediately upgrade all instances of SandboxJS to version 0.8.31 or later, where the vulnerability is fixed. 2. Audit all applications and services that use SandboxJS to identify and isolate vulnerable versions. 3. Implement strict input validation and sanitization for any code or data executed within SandboxJS to reduce the risk of malicious payloads. 4. Employ runtime monitoring and anomaly detection to identify unusual prototype modifications or suspicious execSync usage. 5. Restrict the use of sensitive functions like execSync within sandboxed environments or replace them with safer alternatives. 6. Use additional sandboxing or containerization layers to limit the impact of potential escapes. 7. Conduct regular security reviews and penetration testing focused on prototype pollution and sandbox escape vectors. 8. Educate developers about secure coding practices related to prototype pollution and sandbox usage.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-06T21:08:39.129Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a52254b57a58fa1728462
Added to database: 2/9/2026, 9:31:17 PM
Last enriched: 2/17/2026, 9:50:08 AM
Last updated: 3/26/2026, 9:47:25 PM
Views: 212
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.