Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v27g-jcqj-v8rw | vm2 is Vulnerable to Host File Path Disclosure via Stack Trace Information Leak |
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vm2 Project
Vm2 Project vm2 |
|
| CPEs | cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Vm2 Project
Vm2 Project vm2 |
Wed, 13 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, vm2's CallSite wrapper class (intended as a safe wrapper for V8's native CallSite) blocks getThis() and getFunction() to prevent host object leakage, but allows getFileName() to return unsanitized host absolute paths. Any sandboxed code can extract the full directory structure, library paths, and framework versions of the host server. This vulnerability is fixed in 3.11.0. | |
| Title | vm2: Host File Path Disclosure via Stack Trace Information Leak | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:23:31.281Z
Reserved: 2026-05-04T21:24:36.505Z
Link: CVE-2026-44002
Updated: 2026-05-14T18:23:28.004Z
Status : Analyzed
Published: 2026-05-13T18:16:16.857
Modified: 2026-05-14T15:23:29.507
Link: CVE-2026-44002
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:30:03Z
Github GHSA