CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 13, 2026

Critical SandboxJS Escape Vulnerability Enables Host Takeover

Cybersecurity News Archived May 13, 2026 ✓ Full text saved

A critical security flaw has been found in SandboxJS, a widely used JavaScript sandboxing library available on npm. The vulnerability allows attackers to break out of the sandbox entirely and run any code they want directly on the host system. Tracked as CVE-2026-43898, it carries a maximum severity score of 10.0, which is as serious […] The post Critical SandboxJS Escape Vulnerability Enables Host Takeover appeared first on Cyber Security News .

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Critical SandboxJS Escape Vulnerability Enables Host Takeover By Tushar Subhra Dutta May 13, 2026 A critical security flaw has been found in SandboxJS, a widely used JavaScript sandboxing library available on npm. The vulnerability allows attackers to break out of the sandbox entirely and run any code they want directly on the host system. Tracked as CVE-2026-43898, it carries a maximum severity score of 10.0, which is as serious as a security vulnerability can possibly get in today’s increasingly hostile global threat landscape. The flaw affects all versions of the @nyariv/sandboxjs package up to and including version 0.9.5. At its core, the problem is that sandbox-defined functions were accidentally leaking a powerful internal callback called LispType.Call. Once an attacker gets hold of that callback, they can use it to reach outside the sandbox and take full, unrestricted control of the entire underlying host environment. Security researchers at GitHub identified the flaw and published the advisory under the identifier GHSA-g8f2-4f4f-5jqw. The vulnerability was reported by a security researcher known as Macabely, who also provided a working proof-of-concept to demonstrate exactly how the escape could be carried out under real-world conditions. The impact is severe, since an attacker exploiting this flaw can achieve full remote code execution on the host machine, with no login credentials required and no need for any user interaction whatsoever. That means any application using the affected library to run untrusted JavaScript is potentially at risk of complete and total host takeover. How the Sandbox Escape Works? A patched version, 0.9.6, has been released and is now available on npm. All users of the affected package are strongly advised to update immediately. Staying on any version at or below 0.9.5 leaves the door wide open for this type of devastating attack. The vulnerability lives in the property access logic inside a file called prop.ts, specifically in a function called addOps. The issue is that sandboxed code was allowed to read the caller, callee, and arguments properties on functions. In the CommonJS build of the library, this made it possible for a sandboxed function to call something like function f(){ return f.caller } and receive back the internal host-side callback that originally triggered it. That leaked callback is the LispType.Call operation, which handles function calls inside the runtime. The critical problem is that this handler accepts a params object and uses its fields directly, without checking whether those fields actually came from the trusted executor. Since the attacker fully controls those fields, they can craft forged input that tricks the handler into doing things it was never meant to do. By chaining a series of crafted calls through the leaked callback, an attacker can extract the real host Function constructor. Once they have that, they can pass it a string of JavaScript code and execute it directly on the host. The proof-of-concept included in the advisory demonstrates this clearly by running a system command through Node’s built-in child_process module. Remote Code Execution and the Broader Risk The CVSS score of 10.0 reflects just how dangerous this vulnerability truly is. The attack can be launched over the network, requires low complexity to pull off, needs no special privileges, and does not rely on any action from a user. The scope is marked as Changed, meaning a successful exploit crosses the boundary from the sandbox environment directly into the host system. Any platform that uses SandboxJS to execute user-submitted or third-party JavaScript is in the line of fire. This includes online code editors, server-side scripting tools, automation platforms, and any application that processes untrusted scripts. Once the sandbox is broken, attackers gain full access to the confidentiality, integrity, and availability of the host. The fix in version 0.9.6 addresses the root cause by blocking access to the caller, callee, and arguments properties within sandboxed code. Developers who cannot update right away should avoid running any untrusted JavaScript through the affected library until the patch has been properly applied and thoroughly tested in their own environment. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Tushar Subhra Dutta Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics. Trending News Hackers Abuse Signed Logitech Installer to Deploy TCLBANKER Banking Trojan Microsoft Teams for Android Allow Users to Join Third-Party Meetings via SIP New Ivanti EPMM 0-Day Vulnerability Actively Exploited in Attacks iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone and Android Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2 Latest News Cyber Security News New Exim BDAT GnuTLS Vulnerability Enables Code Execution Attacks Cyber Security News Google Enhances Android Mobile Security with New AI-Powered Protections Cyber Security News Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2 Cyber Security News Top 10 Best Data Loss Prevention Software in 2026 Cyber Security News Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 13, 2026
    Archived
    May 13, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗