Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9p4w-fq8m-2hp7 | SandboxJS Vulnerable to Prototype Pollution -> Sandbox Escape -> RCE |
Wed, 18 Feb 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1321 | |
| CPEs | cpe:2.3:a:nyariv:sandboxjs:*:*:*:*:*:node.js:*:* |
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nyariv
Nyariv sandboxjs |
|
| Vendors & Products |
Nyariv
Nyariv sandboxjs |
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27. | |
| Title | SandboxJS Prototype Pollution -> Sandbox Escape -> RCE | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T16:53:07.833Z
Reserved: 2026-01-29T15:39:11.820Z
Link: CVE-2026-25142
Updated: 2026-02-04T15:55:47.805Z
Status : Analyzed
Published: 2026-02-02T23:16:09.440
Modified: 2026-02-18T14:34:30.523
Link: CVE-2026-25142
No data.
OpenCVE Enrichment
Updated: 2026-04-18T14:30:02Z
Github GHSA