Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-47x8-96vw-5wg6 | vm2 Access to Host Object Enables Sandbox Escape |
Thu, 14 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vm2 Project
Vm2 Project vm2 |
|
| CPEs | cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Vm2 Project
Vm2 Project vm2 |
Thu, 14 May 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0. | |
| Title | vm2: Sandbox Escape | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T03:56:41.615Z
Reserved: 2026-05-04T20:24:31.917Z
Link: CVE-2026-43997
Updated: 2026-05-13T18:40:07.880Z
Status : Analyzed
Published: 2026-05-13T18:16:16.177
Modified: 2026-05-14T15:37:30.850
Link: CVE-2026-43997
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z
Github GHSA