Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v37h-5mfm-c47c | VM2 Has Sandbox Breakout Through Inspect Function |
Fri, 08 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vm2 Project
Vm2 Project vm2 |
|
| CPEs | cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Vm2 Project
Vm2 Project vm2 |
Wed, 06 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-653 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 04 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability through the inspect function. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patched in version 3.11.0. | |
| Title | vm2: Sandbox Breakout Through Inspect | |
| Weaknesses | CWE-693 CWE-94 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T17:15:45.844Z
Reserved: 2026-01-26T21:06:47.869Z
Link: CVE-2026-24781
Updated: 2026-05-04T17:14:09.275Z
Status : Analyzed
Published: 2026-05-04T17:16:21.960
Modified: 2026-05-08T19:29:32.053
Link: CVE-2026-24781
OpenCVE Enrichment
Updated: 2026-05-06T02:00:12Z
Github GHSA