The Hacker NewsArchived May 09, 2026✓ Full text saved
A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted JavaScript code inside a secure sandbox by intercepting and proxying JavaScript objects to prevent sandboxed code from accessing the host
Full text archived locally
✦ AI Summary· Claude Sonnet
vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution
Ravie LakshmananMay 07, 2026Vulnerability / Software Security
A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems.
vm2 is an open-source library used to run untrusted JavaScript code inside a secure sandbox by intercepting and proxying JavaScript objects to prevent sandboxed code from accessing the host environment.
The security flaws are listed below -
CVE-2026-24118 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "__lookupGetter__" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0)
CVE-2026-24120 (CVSS score: 9.8) - A patch bypass for CVE-2023-37466 (CVSS score: 9.8) that could allow attackers to escape the sandbox through the species property of promise objects and execute arbitrary commands on the underlying host. (Affects versions <= 3.10.3, patched in 3.10.5)
CVE-2026-24781 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via the "inspect" function and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.3, patches in 3.11.0)
CVE-2026-26332 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "SuppressedError" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0)
CVE-2026-26956 (CVSS score: 9.8) - A protection mechanism failure vulnerability that allows sandbox escape with arbitrary code execution by triggering a TypeError produced by Symbol-to-string coercion. (Affects version 3.10.4, confirmed on Node.js 25.6.1, patched in 3.10.5)
CVE-2026-43997 (CVSS score: 10.0) - A code injection vulnerability that allows an attacker to obtain the host Object and escape the sandbox, leading to arbitrary code execution. (Affects versions <= 3.10.5, patched in 3.11.0)
CVE-2026-43999 (CVSS score: 9.9) - A vulnerability that allows a bypass of NodeVM's built-in allowlist and enables an attacker to load excluded builtins like child_process and achieve remote code execution. (Affects version 3.10.5, patched in 3.11.0)
CVE-2026-44005 (CVSS score: 10.0) - A vulnerability that allows attacker-controlled JavaScript to escape the sandbox and enable prototype pollution. (Affects versions 3.9.6-3.10.5, patched in 3.11.0)
CVE-2026-44006 (CVSS score: 10.0) - A code injection vulnerability via "BaseHandler.getPrototypeOf" that enables sandbox escape and remote code execution. (Affects versions <= 3.10.5, patched in 3.11.0)
CVE-2026-44007 (CVSS score: 9.1) - An improper access control vulnerability that allows sandbox escape and execution of arbitrary operating system commands on the underlying host. (Affects versions <= 3.11.0, patched in 3.11.1)
CVE-2026-44008 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "neutralizeArraySpeciesBatch()" and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2)
CVE-2026-44009 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via a null proto exception and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2)
The disclosure comes a couple of months after vm2 maintainer Patrik Simek released patches for another critical sandbox escape flaw (CVE-2026-22709, CVSS score: 9.8) that could lead to arbitrary code execution on the underlying host system.
The string of newly identified sandbox escapes illustrates the challenge of securely isolating untrusted code in JavaScript-based sandbox environments, with Simek acknowledging previously that new bypasses will likely be discovered in the future. Users of vm2 are advised to update to the latest version (3.11.2) for optimal protection.
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
Code Injection, cybersecurity, JavaScript, Open Source, remote code execution, sandbox, software security, Vulnerability
⚡ Top Stories This Week
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE and More
The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
Day Zero Readiness: The Operational Gaps That Break Incident Response
Trellix Confirms Source Code Breach With Unauthorized Repository Access
Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
2026: The Year of AI-Assisted Attacks
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
Load More ▼
⭐ Featured Resources
[Guide] Get Practical AI SOC Insights to Improve Threat Detection
[Demo] Stop Email Attacks and Protect Cloud Workspace Data Faster
[Demo] Discover How to Control Autonomous Identity Risks Effectively
[Webinar] Learn How Autonomous Validation Keeps Pace With AI Attacks