Cyber Posture

CVE-2026-26954

CriticalPublic PoCRCE

Published: 13 March 2026

Published
13 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0009 25.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26954 is a critical-severity Code Injection (CWE-94) vulnerability in Nyariv Sandboxjs. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 25.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly and comprehensively addresses CVE-2026-26954 by requiring timely remediation through upgrade to the fixed SandboxJS version 0.8.34.

detect

Identifies the presence of the vulnerable SandboxJS library prior to 0.8.34 through vulnerability scanning, enabling proactive patching.

prevent

Mandates software-enforced separation policies critical for JavaScript sandbox integrity, mitigating escape via Function constructor access.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Sandbox escape in JS library directly enables arbitrary JavaScript execution (T1059.007) via Function constructor abuse and remote unauthenticated exploitation of the hosting application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Function} where p is any…

more

constructible property. This vulnerability is fixed in 0.8.34.

Deeper analysisAI

SandboxJS, a JavaScript sandboxing library, contains a critical vulnerability identified as CVE-2026-26954 in versions prior to 0.8.34. The flaw allows attackers to obtain arrays containing the Function constructor, enabling sandbox escape. Specifically, with access to such an array and the Object.fromEntries method, adversaries can construct objects like {[p]: Function} where p represents any constructible property, bypassing sandbox restrictions. This issue is classified under CWE-94 (Improper Control of Generation of Code) and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

The vulnerability can be exploited remotely by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation leads to full sandbox escape, granting high-impact confidentiality, integrity, and availability compromises in a changed scope, potentially allowing arbitrary code execution within the targeted JavaScript environment.

The GitHub Security Advisory (GHSA-6r9f-759j-hjgv) confirms that the vulnerability is fixed in SandboxJS version 0.8.34, recommending immediate upgrades to mitigate the risk. No additional workarounds are specified in the provided references.

Details

CWE(s)

Affected Products

nyariv
sandboxjs
≤ 0.8.34

CVEs Like This One

CVE-2026-25587Same product: Nyariv Sandboxjs
CVE-2026-34217Same product: Nyariv Sandboxjs
CVE-2026-25142Same product: Nyariv Sandboxjs
CVE-2026-25881Same product: Nyariv Sandboxjs
CVE-2026-23830Same product: Nyariv Sandboxjs
CVE-2026-25520Same product: Nyariv Sandboxjs
CVE-2026-25641Same product: Nyariv Sandboxjs
CVE-2026-25586Same product: Nyariv Sandboxjs
CVE-2026-34208Same product: Nyariv Sandboxjs
CVE-2026-34211Same product: Nyariv Sandboxjs

References