Cyber Posture

CVE-2026-25520

CriticalPublic PoC

Published: 06 February 2026

Published
06 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0005 16.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25520 is a critical-severity Injection (CWE-74) vulnerability in Nyariv Sandboxjs. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-4 (Information in Shared System Resources) and SC-50 (Software-enforced Separation and Policy Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching of the SandboxJS library to version 0.8.29 or later, directly fixing the failure to wrap function return values that enables sandbox escape.

prevent

Mandates software-enforced separation policies to prevent sandboxed JavaScript from accessing host objects like the Function constructor via unwrapped returns.

prevent

Prevents unauthorized transfer of host objects, such as the Function constructor, through shared resources like unwrapped function return values in the sandbox.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Sandbox escape in JS library allows remote unauthenticated attackers to supply malicious code that directly executes arbitrary host code, mapping to public-facing app exploitation and JavaScript interpreter abuse.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The return values of functions aren't wrapped. Object.values/Object.entries can be used to get an Array containing the host's Function constructor, by using Array.prototype.at you can obtain the hosts Function constructor, which…

more

can be used to execute arbitrary code outside of the sandbox. This vulnerability is fixed in 0.8.29.

Deeper analysisAI

CVE-2026-25520 is a critical vulnerability in SandboxJS, a JavaScript sandboxing library, affecting versions prior to 0.8.29. The issue arises because return values of functions are not properly wrapped, enabling the use of Object.values or Object.entries to obtain an array containing the host's Function constructor. Attackers can then leverage Array.prototype.at to access this constructor and execute arbitrary code outside the sandbox. The vulnerability is rated with a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-74.

Any remote attacker can exploit this vulnerability without privileges or user interaction, as long as they can supply malicious JavaScript code to the sandboxed environment. Successful exploitation allows full sandbox escape, granting the attacker the ability to execute arbitrary code on the host system with the privileges of the process running SandboxJS, potentially leading to complete compromise of the affected application or server.

The vulnerability was addressed in SandboxJS version 0.8.29. Security advisories recommend updating to this patched version immediately. Details on the fix are provided in the GitHub security advisory at https://github.com/nyariv/SandboxJS/security/advisories/GHSA-58jh-xv4v-pcx4 and the fixing commit at https://github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3.

Details

CWE(s)

Affected Products

nyariv
sandboxjs
≤ 0.8.29

CVEs Like This One

CVE-2026-25586Same product: Nyariv Sandboxjs
CVE-2026-34217Same product: Nyariv Sandboxjs
CVE-2026-26954Same product: Nyariv Sandboxjs
CVE-2026-25881Same product: Nyariv Sandboxjs
CVE-2026-25641Same product: Nyariv Sandboxjs
CVE-2026-25587Same product: Nyariv Sandboxjs
CVE-2026-23830Same product: Nyariv Sandboxjs
CVE-2026-25142Same product: Nyariv Sandboxjs
CVE-2026-34208Same product: Nyariv Sandboxjs
CVE-2026-34211Same product: Nyariv Sandboxjs

References