CVE-2026-26954: CWE-94: Improper Control of Generation of Code ('Code Injection') in nyariv SandboxJS
CVE-2026-26954 is a critical code injection vulnerability in the JavaScript sandboxing library SandboxJS versions prior to 0. 8. 34. The flaw allows attackers to escape the sandbox environment by obtaining arrays containing the Function constructor and leveraging Object. fromEntries to create objects with properties that execute arbitrary code. This vulnerability enables full compromise of confidentiality, integrity, and availability without requiring authentication or user interaction. It affects all deployments using vulnerable versions of SandboxJS, potentially exposing systems to remote code execution. The issue is fixed in version 0. 8. 34.
AI Analysis
Technical Summary
SandboxJS is a JavaScript sandboxing library designed to safely execute untrusted code by restricting access to dangerous functions and objects. Versions prior to 0.8.34 contain a critical vulnerability (CVE-2026-26954) classified under CWE-94 (Improper Control of Generation of Code, i.e., code injection). The vulnerability arises because it is possible to obtain arrays containing the JavaScript Function constructor within the sandboxed environment. By combining this with Object.fromEntries, an attacker can dynamically construct an object with a property whose value is the Function constructor, effectively allowing the execution of arbitrary code outside the sandbox constraints. This sandbox escape leads to a complete bypass of the security model, enabling attackers to run malicious code with the privileges of the host environment. The vulnerability requires no authentication or user interaction and can be exploited remotely if the sandbox is exposed to untrusted inputs. The issue was addressed and fixed in SandboxJS version 0.8.34 by preventing access to the Function constructor within arrays and restricting the use of Object.fromEntries in this context.
Potential Impact
The impact of this vulnerability is severe and far-reaching. Exploitation allows attackers to execute arbitrary code on the host system, leading to full compromise of confidentiality, integrity, and availability. This could result in data theft, unauthorized system control, deployment of malware or ransomware, and disruption of critical services. Organizations using SandboxJS to isolate untrusted JavaScript code, such as in web applications, serverless functions, or embedded scripting environments, are at risk. The vulnerability's ease of exploitation (no authentication or user interaction required) and the critical nature of sandbox escapes make it a high-priority threat. If exploited in environments processing sensitive or critical workloads, the consequences could include significant financial loss, reputational damage, and regulatory penalties.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all SandboxJS deployments to version 0.8.34 or later, where the issue is fixed. Additionally, review and audit any custom sandboxing or code execution controls to ensure they do not expose similar weaknesses. Implement strict input validation and sanitization to reduce the risk of malicious payloads reaching the sandbox. Employ runtime monitoring and anomaly detection to identify suspicious code execution patterns indicative of sandbox escapes. Where possible, isolate sandboxed environments using containerization or virtual machines to limit the blast radius of potential exploits. Finally, maintain an up-to-date inventory of all software components and dependencies to facilitate rapid patching of critical vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Australia, Canada
CVE-2026-26954: CWE-94: Improper Control of Generation of Code ('Code Injection') in nyariv SandboxJS
Description
CVE-2026-26954 is a critical code injection vulnerability in the JavaScript sandboxing library SandboxJS versions prior to 0. 8. 34. The flaw allows attackers to escape the sandbox environment by obtaining arrays containing the Function constructor and leveraging Object. fromEntries to create objects with properties that execute arbitrary code. This vulnerability enables full compromise of confidentiality, integrity, and availability without requiring authentication or user interaction. It affects all deployments using vulnerable versions of SandboxJS, potentially exposing systems to remote code execution. The issue is fixed in version 0. 8. 34.
AI-Powered Analysis
Technical Analysis
SandboxJS is a JavaScript sandboxing library designed to safely execute untrusted code by restricting access to dangerous functions and objects. Versions prior to 0.8.34 contain a critical vulnerability (CVE-2026-26954) classified under CWE-94 (Improper Control of Generation of Code, i.e., code injection). The vulnerability arises because it is possible to obtain arrays containing the JavaScript Function constructor within the sandboxed environment. By combining this with Object.fromEntries, an attacker can dynamically construct an object with a property whose value is the Function constructor, effectively allowing the execution of arbitrary code outside the sandbox constraints. This sandbox escape leads to a complete bypass of the security model, enabling attackers to run malicious code with the privileges of the host environment. The vulnerability requires no authentication or user interaction and can be exploited remotely if the sandbox is exposed to untrusted inputs. The issue was addressed and fixed in SandboxJS version 0.8.34 by preventing access to the Function constructor within arrays and restricting the use of Object.fromEntries in this context.
Potential Impact
The impact of this vulnerability is severe and far-reaching. Exploitation allows attackers to execute arbitrary code on the host system, leading to full compromise of confidentiality, integrity, and availability. This could result in data theft, unauthorized system control, deployment of malware or ransomware, and disruption of critical services. Organizations using SandboxJS to isolate untrusted JavaScript code, such as in web applications, serverless functions, or embedded scripting environments, are at risk. The vulnerability's ease of exploitation (no authentication or user interaction required) and the critical nature of sandbox escapes make it a high-priority threat. If exploited in environments processing sensitive or critical workloads, the consequences could include significant financial loss, reputational damage, and regulatory penalties.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all SandboxJS deployments to version 0.8.34 or later, where the issue is fixed. Additionally, review and audit any custom sandboxing or code execution controls to ensure they do not expose similar weaknesses. Implement strict input validation and sanitization to reduce the risk of malicious payloads reaching the sandbox. Employ runtime monitoring and anomaly detection to identify suspicious code execution patterns indicative of sandbox escapes. Where possible, isolate sandboxed environments using containerization or virtual machines to limit the blast radius of potential exploits. Finally, maintain an up-to-date inventory of all software components and dependencies to facilitate rapid patching of critical vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b45b752f860ef943872ec1
Added to database: 3/13/2026, 6:46:13 PM
Last enriched: 3/13/2026, 6:46:27 PM
Last updated: 3/13/2026, 7:52:52 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.