Cyber Posture

CVE-2026-25142

CriticalPublic PoCRCE

Published: 02 February 2026

Published
02 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0022 44.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25142 is a critical-severity Code Injection (CWE-94) vulnerability in Nyariv Sandboxjs. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and SC-50 (Software-enforced Separation and Policy Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of the SandboxJS flaw by applying the patch in version 0.8.27 that restricts __lookupGetter__ to prevent sandbox escape.

prevent

Mandates software-enforced separation policies that address prototype access restrictions in JavaScript sandboxes like SandboxJS to block unauthorized escapes.

prevent

Ensures the SandboxJS reference monitor properly mediates access to prototypes via __lookupGetter__, preventing attackers from bypassing sandbox boundaries.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote code execution via exploitation of a public-facing JavaScript sandboxing library (AV:N/AC:L/PR:N), directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict __lookupGetter__ which can be used to obtain prototypes, which can be used for escaping the sandbox / remote code execution. This vulnerability is fixed in 0.8.27.

Deeper analysisAI

CVE-2026-25142 affects SandboxJS, a JavaScript sandboxing library, in versions prior to 0.8.27. The vulnerability stems from improper restrictions on the __lookupGetter__ function, which allows attackers to access prototypes and escape the sandbox, potentially leading to remote code execution. This issue is classified under CWE-94 (Improper Control of Generation of Code) and CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes), with a maximum CVSS v3.1 score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility and high impact across confidentiality, integrity, and availability.

Any remote attacker can exploit this vulnerability without authentication, privileges, or user interaction by leveraging the unrestricted __lookupGetter__ to retrieve prototypes and bypass sandbox boundaries. Successful exploitation enables full sandbox escape, granting attackers the ability to execute arbitrary code in the context of the hosting application, potentially compromising the entire system.

The GitHub security advisory (GHSA-9p4w-fq8m-2hp7) and associated commit (75c8009db32e6829b0ad92ca13bf458178442bd3) detail the fix implemented in version 0.8.27, which properly restricts prototype access in the executor module (src/executor.ts lines 368-398). Security practitioners should update to SandboxJS 0.8.27 or later to mitigate this issue.

Details

CWE(s)

Affected Products

nyariv
sandboxjs
≤ 0.8.27

CVEs Like This One

CVE-2026-26954Same product: Nyariv Sandboxjs
CVE-2026-25881Same product: Nyariv Sandboxjs
CVE-2026-25587Same product: Nyariv Sandboxjs
CVE-2026-23830Same product: Nyariv Sandboxjs
CVE-2026-34217Same product: Nyariv Sandboxjs
CVE-2026-25520Same product: Nyariv Sandboxjs
CVE-2026-25641Same product: Nyariv Sandboxjs
CVE-2026-34211Same product: Nyariv Sandboxjs
CVE-2026-25586Same product: Nyariv Sandboxjs
CVE-2026-34208Same product: Nyariv Sandboxjs

References