Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8pfc-jjgw-6g26 | SandboxJS: Stack overflow DoS via deeply nested expressions in recursive descent parser |
Thu, 09 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nyariv:sandboxjs:*:*:*:*:*:node.js:*:* |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nyariv
Nyariv sandboxjs |
|
| Vendors & Products |
Nyariv
Nyariv sandboxjs |
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandboxjs parser contains unbounded recursion in the restOfExp function and the lispify/lispifyExpr call chain. An attacker can crash any Node.js process that parses untrusted input by supplying deeply nested expressions (e.g., ~2000 nested parentheses), causing a RangeError: Maximum call stack size exceeded that terminates the process. This vulnerability is fixed in 0.8.36. | |
| Title | SandboxJS: Stack overflow DoS via deeply nested expressions in recursive descent parser | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:09:53.356Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34211
Updated: 2026-04-07T14:09:47.157Z
Status : Analyzed
Published: 2026-04-06T16:16:34.743
Modified: 2026-04-09T18:05:21.810
Link: CVE-2026-34211
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:12Z
Github GHSA