Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-39911: CWE-668 Exposure of Resource to Wrong Sphere in hashgraph guardian

0
High
VulnerabilityCVE-2026-39911cvecve-2026-39911cwe-668
Published: Thu Apr 09 2026 (04/09/2026, 17:57:20 UTC)
Source: CVE Database V5
Vendor/Project: hashgraph
Product: guardian

Description

Hashgraph Guardian versions through 3. 5. 0 have a high-severity vulnerability (CVE-2026-39911) involving unsandboxed JavaScript execution in the Custom Logic policy block worker. Authenticated Standard Registry users can execute arbitrary code by supplying JavaScript expressions directly to the Node. js Function() constructor without isolation. This allows attackers to import native Node. js modules, read arbitrary container filesystem files, access sensitive environment variables including RSA private keys, JWT signing keys, and API tokens, and forge valid authentication tokens for any user, including administrators. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating high severity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 18:35:53 UTC

Technical Analysis

CVE-2026-39911 is a vulnerability in Hashgraph Guardian up to version 3.5.0 where the Custom Logic policy block worker unsafely executes user-supplied JavaScript code via the Node.js Function() constructor without sandboxing. Authenticated users with Standard Registry privileges can exploit this to execute arbitrary code within the container environment. Exploitation enables reading arbitrary files, accessing sensitive environment variables containing credentials such as RSA private keys, JWT signing keys, and API tokens, and forging authentication tokens for any user including administrators. This represents an exposure of resources to an unauthorized sphere (CWE-668). The vulnerability is remotely exploitable without user interaction and requires only low privileges (authenticated Standard Registry user). No official patch or remediation level has been published as of the data provided.

Potential Impact

Successful exploitation allows an authenticated Standard Registry user to execute arbitrary code within the container hosting Hashgraph Guardian. This leads to disclosure of sensitive files and environment variables, including cryptographic keys and tokens, and enables forging of authentication tokens for any user, including administrators. This can result in full system compromise and unauthorized access to protected resources. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict Standard Registry user access to trusted personnel only and consider disabling or limiting use of the Custom Logic policy block worker feature if feasible. Monitor for updates from the vendor regarding patches or official mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-04-07T20:57:06.209Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69d7ee091cc7ad14da04a8ce

Added to database: 4/9/2026, 6:20:57 PM

Last enriched: 4/9/2026, 6:35:53 PM

Last updated: 4/9/2026, 9:21:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses