Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2gg9-6p7w-6cpj | SandboxJS: Sandbox integrity escape |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nyariv
Nyariv sandboxjs |
|
| Vendors & Products |
Nyariv
Nyariv sandboxjs |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process. This vulnerability is fixed in 0.8.36. | |
| Title | SandboxJS: Sandbox integrity escape | |
| Weaknesses | CWE-693 CWE-915 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T18:39:14.717Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34208
Updated: 2026-04-06T18:39:10.583Z
Status : Received
Published: 2026-04-06T16:16:34.580
Modified: 2026-04-06T16:16:34.580
Link: CVE-2026-34208
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:32:27Z
Github GHSA