Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
May 19, 2026
Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto
May 19, 2026
Elite SOCs Operationalize Threat Intelligence: 3 Tactics
May 19, 2026
Home/CyberSecurity News/Critical SandboxJS Flaw Enables Remote Host Takeover
CyberSecurity News

Critical SandboxJS Flaw Enables Remote Host Takeover

A severe sandbox escape vulnerability discovered within the JavaScript library now allows attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS...

David kimber
David kimber
February 11, 2026 2 Min Read
6 0

A severe sandbox escape vulnerability discovered within the JavaScript library now allows attackers to execute arbitrary code on host systems.

The flaw, tracked as CVE-2026-25881 with a critical CVSS score of 8.3/10, affects all versions up to 0.8.30 and has been patched in version 0.8.31.

The vulnerability exploits a weakness in SandboxJS’s protection mechanism. The library uses an “isGlobal” flag to prevent sandboxed code from modifying host system objects.

However, when global prototype references like Map. prototype or Set. Prototypes are placed into an array, then retrieved; the protective flag is stripped away.

This process, called “prototype pollution,” allows attackers to modify core JavaScript objects permanently.

Sandboxed code: const m=[Map.prototype][0]
              ↓
Array creation: isGlobal taint stripped via valueOrProp()
              ↓
Prototype mutation: m.cmd='id' (host prototype polluted)
              ↓
Host-side impact: new Map().cmd === 'id' (persistent)
              ↓
RCE (application-dependent): host code calls execSync(obj.cmd)

For example, sandboxed code can inject a malicious command property into the Map prototype, which then persists across the entire host application.

When the host code later uses this polluted property in sensitive operations, such as executing system commands, attackers can achieve remote code execution.

Security researcher k14uz released working exploit code demonstrating three attack scenarios.

The simplest proof-of-concept shows how sandboxed code can add a “polluted” property to the Map prototype, which then appears in all new Map objects created by the host.

More dangerous demonstrations include overwriting built-in functions and executing system commands like “id” to reveal user information.

The attack chain is straightforward:

Action Description
Create Array Create an array containing a prototype reference.
Extract Reference Extract the prototype reference from the array, causing the protection flag to be lost.
Modify Prototype Add malicious properties or override existing ones on the prototype.
Trigger Usage Wait for host code to access the modified properties in sensitive operations.

Any application using SandboxJS to run untrusted JavaScript code is vulnerable.

Attackers can break sandbox isolation, manipulate host execution flow, and potentially gain full system access depending on how the host application processes the polluted properties.

According to the advisory published, developers must immediately upgrade to version 0.8.31, which preserves protection flags across array operations and blocks writes to built-in prototypes.

As additional defense, security teams should freeze built-in prototypes before executing untrusted code and audit applications for sensitive operations that might use user-controlled object properties.

This vulnerability highlights the challenges of creating secure JavaScript sandboxes. It underscores the importance of defense-in-depth when handling untrusted code.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Prometei Botnet Attacks Windows Server for Remote Access,

Next Post

Critical UUID Flaw in Fiber v2 on Go 1.24+ Enables Session

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Operation Ramz Seizes 53 Servers: Cyber Linked Scams
May 19, 2026
Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised
May 19, 2026
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us