Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cp6g-6699-wx9c | vm2 has a NodeVM require.root bypass via symlink traversal that allows sandbox escape |
Thu, 14 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vm2 Project
Vm2 Project vm2 |
|
| CPEs | cpe:2.3:a:vm2_project:vm2:3.10.5:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Vm2 Project
Vm2 Project vm2 |
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because path validation uses path.resolve() (which does not dereference symlinks) but module loading uses Node's native require() (which does), an attacker can load arbitrary host-realm modules and achieve remote code execution. This vulnerability is fixed in 3.11.0. | |
| Title | vm2: NodeVM require.root bypass via symlink traversal allows sandbox escape | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T03:55:52.827Z
Reserved: 2026-05-04T20:24:31.917Z
Link: CVE-2026-43998
Updated: 2026-05-13T18:08:47.351Z
Status : Analyzed
Published: 2026-05-13T18:16:16.317
Modified: 2026-05-14T15:36:55.493
Link: CVE-2026-43998
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z
Github GHSA