Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27597: CWE-94: Improper Control of Generation of Code ('Code Injection') in agentfront enclave

0
Critical
VulnerabilityCVE-2026-27597cvecve-2026-27597cwe-94
Published: Wed Feb 25 2026 (02/25/2026, 03:56:25 UTC)
Source: CVE Database V5
Vendor/Project: agentfront
Product: enclave

Description

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be used to achieve remote code execution (RCE). The issue has been fixed in version 2.11.1.

AI-Powered Analysis

AILast updated: 02/25/2026, 04:28:37 UTC

Technical Analysis

CVE-2026-27597 is a critical security vulnerability identified in agentfront's enclave product, a secure JavaScript sandbox designed specifically for safe execution of AI agent code. The vulnerability stems from improper control over code generation (classified under CWE-94), which allows malicious actors to escape the sandbox's security boundaries implemented by the @enclave-vm/core module. This escape enables attackers to execute arbitrary code remotely on the host system without requiring any authentication or user interaction. The flaw affects all enclave versions prior to 2.11.1, with the vendor releasing a fix in version 2.11.1 to address the issue. The CVSS v3.1 score is 10.0 (critical), reflecting that the vulnerability is remotely exploitable over the network with low attack complexity, no privileges required, and no user interaction needed. The scope is complete, impacting confidentiality, integrity, and availability of the affected systems. Although no known exploits have been reported in the wild yet, the nature of the vulnerability and its critical severity make it a prime target for attackers seeking remote code execution capabilities within AI sandbox environments. The vulnerability could allow attackers to fully compromise systems running vulnerable enclave versions, potentially leading to data breaches, system manipulation, or disruption of AI services.

Potential Impact

The impact of CVE-2026-27597 is severe and far-reaching for organizations worldwide using the agentfront enclave sandbox for AI agent code execution. Successful exploitation results in remote code execution with full control over the affected system, compromising confidentiality, integrity, and availability. This can lead to unauthorized data access or exfiltration, manipulation or destruction of AI workloads, and disruption of critical AI-driven services. Given the increasing reliance on AI agents in sectors such as finance, healthcare, telecommunications, and government, the vulnerability poses significant operational and reputational risks. Attackers could leverage this flaw to establish persistent footholds, pivot within networks, or deploy ransomware and other malware. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of attacks. Organizations that have integrated enclave into their AI infrastructure without timely patching are at high risk of compromise, potentially affecting business continuity and regulatory compliance.

Mitigation Recommendations

To mitigate CVE-2026-27597, organizations must immediately upgrade all instances of agentfront enclave to version 2.11.1 or later, where the vulnerability has been fixed. Prioritize patching in production environments running AI workloads that rely on enclave for sandboxing. Implement network segmentation and strict access controls to limit exposure of enclave services to untrusted networks. Employ runtime monitoring and anomaly detection to identify unusual behaviors indicative of sandbox escapes or code injection attempts. Conduct thorough code reviews and security testing of AI agent code executed within enclave to minimize risk. Additionally, consider deploying application-layer firewalls or intrusion prevention systems capable of detecting exploitation attempts targeting JavaScript sandbox environments. Maintain an up-to-date inventory of enclave deployments and enforce strict patch management policies. Finally, educate development and security teams about the risks associated with code injection vulnerabilities and sandbox escapes to improve overall security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.601Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379a3

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 2/25/2026, 4:28:37 AM

Last updated: 2/26/2026, 8:02:10 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats