Логотип exploitDog
bind:CVE-2026-25586
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25586

Количество 2

Количество 2

nvd логотип

CVE-2026-25586

2 дня назад

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked prototype properties, enabling host Object.prototype pollution and persistent cross-sandbox impact. This vulnerability is fixed in 0.8.29.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-jjpw-65fv-8g48

3 дня назад

@nyariv/sandboxjs has Sandbox Escape via Prototype Whitelist Bypass and Host Prototype Pollution

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25586

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandbox escape is possible by shadowing hasOwnProperty on a sandbox object, which disables prototype whitelist enforcement in the property-access path. This permits direct access to __proto__ and other blocked prototype properties, enabling host Object.prototype pollution and persistent cross-sandbox impact. This vulnerability is fixed in 0.8.29.

CVSS3: 10
0%
Низкий
2 дня назад
github логотип
GHSA-jjpw-65fv-8g48

@nyariv/sandboxjs has Sandbox Escape via Prototype Whitelist Bypass and Host Prototype Pollution

CVSS3: 10
0%
Низкий
3 дня назад

Уязвимостей на страницу