Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9qj6-qjgg-37qq | vm2 has sandbox breakout via `neutralizeArraySpeciesBatch` |
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vm2 Project
Vm2 Project vm2 |
|
| CPEs | cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Vm2 Project
Vm2 Project vm2 |
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into the sandbox. This can be used to get host objects and get the host Function object. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This vulnerability is fixed in 3.11.2. | |
| Title | vm2: Snabox breakout via `neutralizeArraySpeciesBatch` | |
| Weaknesses | CWE-668 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T03:55:58.336Z
Reserved: 2026-05-04T21:24:36.505Z
Link: CVE-2026-44008
Updated: 2026-05-14T18:21:37.427Z
Status : Analyzed
Published: 2026-05-13T18:16:17.667
Modified: 2026-05-14T15:17:59.563
Link: CVE-2026-44008
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z
Github GHSA