Description
A prototype pollution vulnerability exists in @nyariv/sandboxjs versions <= 0.8.23, allowing attackers to inject arbitrary properties into Object.prototype via crafted JavaScript code. This can result in a denial-of-service (DoS) condition or, under certain conditions, escape the sandboxed environment intended to restrict code execution. The vulnerability stems from insufficient prototype access checks in the sandbox’s executor logic, particularly in the handling of JavaScript function objects returned.
References (4)
Scores
CVSS v4
7.0
EPSS
0.0046
EPSS Percentile
63.9%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-1321
Status
published
Products (2)
nyariv/sandboxjs
< 0.8.23
nyariv/sandboxjs
0 - 0.8.24npm
Published
Jul 31, 2025
Tracked Since
Feb 18, 2026