CVE-2026-39911: CWE-668 Exposure of Resource to Wrong Sphere in hashgraph guardian
Hashgraph Guardian versions through 3. 5. 0 have a high-severity vulnerability (CVE-2026-39911) involving unsandboxed JavaScript execution in the Custom Logic policy block worker. Authenticated Standard Registry users can execute arbitrary code by supplying JavaScript expressions directly to the Node. js Function() constructor without isolation. This allows attackers to import native Node. js modules, read arbitrary container filesystem files, access sensitive environment variables including RSA private keys, JWT signing keys, and API tokens, and forge valid authentication tokens for any user, including administrators. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating high severity.
AI Analysis
Technical Summary
CVE-2026-39911 is a vulnerability in Hashgraph Guardian up to version 3.5.0 where the Custom Logic policy block worker unsafely executes user-supplied JavaScript code via the Node.js Function() constructor without sandboxing. Authenticated users with Standard Registry privileges can exploit this to execute arbitrary code within the container environment. Exploitation enables reading arbitrary files, accessing sensitive environment variables containing credentials such as RSA private keys, JWT signing keys, and API tokens, and forging authentication tokens for any user including administrators. This represents an exposure of resources to an unauthorized sphere (CWE-668). The vulnerability is remotely exploitable without user interaction and requires only low privileges (authenticated Standard Registry user). No official patch or remediation level has been published as of the data provided.
Potential Impact
Successful exploitation allows an authenticated Standard Registry user to execute arbitrary code within the container hosting Hashgraph Guardian. This leads to disclosure of sensitive files and environment variables, including cryptographic keys and tokens, and enables forging of authentication tokens for any user, including administrators. This can result in full system compromise and unauthorized access to protected resources. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict Standard Registry user access to trusted personnel only and consider disabling or limiting use of the Custom Logic policy block worker feature if feasible. Monitor for updates from the vendor regarding patches or official mitigations.
CVE-2026-39911: CWE-668 Exposure of Resource to Wrong Sphere in hashgraph guardian
Description
Hashgraph Guardian versions through 3. 5. 0 have a high-severity vulnerability (CVE-2026-39911) involving unsandboxed JavaScript execution in the Custom Logic policy block worker. Authenticated Standard Registry users can execute arbitrary code by supplying JavaScript expressions directly to the Node. js Function() constructor without isolation. This allows attackers to import native Node. js modules, read arbitrary container filesystem files, access sensitive environment variables including RSA private keys, JWT signing keys, and API tokens, and forge valid authentication tokens for any user, including administrators. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating high severity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-39911 is a vulnerability in Hashgraph Guardian up to version 3.5.0 where the Custom Logic policy block worker unsafely executes user-supplied JavaScript code via the Node.js Function() constructor without sandboxing. Authenticated users with Standard Registry privileges can exploit this to execute arbitrary code within the container environment. Exploitation enables reading arbitrary files, accessing sensitive environment variables containing credentials such as RSA private keys, JWT signing keys, and API tokens, and forging authentication tokens for any user including administrators. This represents an exposure of resources to an unauthorized sphere (CWE-668). The vulnerability is remotely exploitable without user interaction and requires only low privileges (authenticated Standard Registry user). No official patch or remediation level has been published as of the data provided.
Potential Impact
Successful exploitation allows an authenticated Standard Registry user to execute arbitrary code within the container hosting Hashgraph Guardian. This leads to disclosure of sensitive files and environment variables, including cryptographic keys and tokens, and enables forging of authentication tokens for any user, including administrators. This can result in full system compromise and unauthorized access to protected resources. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict Standard Registry user access to trusted personnel only and consider disabling or limiting use of the Custom Logic policy block worker feature if feasible. Monitor for updates from the vendor regarding patches or official mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-04-07T20:57:06.209Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d7ee091cc7ad14da04a8ce
Added to database: 4/9/2026, 6:20:57 PM
Last enriched: 4/9/2026, 6:35:53 PM
Last updated: 4/9/2026, 9:21:55 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.