CVE-2026-34217: CWE-668: Exposure of Resource to Wrong Sphere in nyariv SandboxJS
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36.
AI Analysis
Technical Summary
SandboxJS versions before 0.8.36 contain a scope modification vulnerability (CWE-668) that enables untrusted sandboxed JavaScript code to access internal interpreter objects by exploiting the new operator. This leads to exposure of sandbox scope objects in the scope hierarchy to untrusted code, which is unintended. Despite this exposure, the sandbox maintains isolation for code evaluation and prototype protection. The issue is resolved in version 0.8.36.
Potential Impact
The vulnerability allows untrusted code running inside the sandbox to leak and potentially modify internal scope objects, which could undermine the intended isolation boundaries within the sandbox environment. However, the sandbox still enforces code evaluation confinement and prototype protection, limiting the scope of impact. There are no known exploits in the wild at this time.
Mitigation Recommendations
Users should upgrade to SandboxJS version 0.8.36 or later, where this vulnerability is fixed. Since the vendor advisory indicates the issue is resolved in 0.8.36, applying this official fix is the recommended remediation. No additional mitigations are specified.
CVE-2026-34217: CWE-668: Exposure of Resource to Wrong Sphere in nyariv SandboxJS
Description
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
SandboxJS versions before 0.8.36 contain a scope modification vulnerability (CWE-668) that enables untrusted sandboxed JavaScript code to access internal interpreter objects by exploiting the new operator. This leads to exposure of sandbox scope objects in the scope hierarchy to untrusted code, which is unintended. Despite this exposure, the sandbox maintains isolation for code evaluation and prototype protection. The issue is resolved in version 0.8.36.
Potential Impact
The vulnerability allows untrusted code running inside the sandbox to leak and potentially modify internal scope objects, which could undermine the intended isolation boundaries within the sandbox environment. However, the sandbox still enforces code evaluation confinement and prototype protection, limiting the scope of impact. There are no known exploits in the wild at this time.
Mitigation Recommendations
Users should upgrade to SandboxJS version 0.8.36 or later, where this vulnerability is fixed. Since the vendor advisory indicates the issue is resolved in 0.8.36, applying this official fix is the recommended remediation. No additional mitigations are specified.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-26T15:57:52.324Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d3d1a00a160ebd92c130d9
Added to database: 4/6/2026, 3:30:40 PM
Last enriched: 4/6/2026, 3:46:36 PM
Last updated: 4/7/2026, 5:45:41 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.