Home

Description

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.

PUBLISHED Reserved 2026-02-02 | Published 2026-02-06 | Updated 2026-02-09 | Assigner GitHub_M




MEDIUM: 6.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')

Product status

< 2.10.1
affected

References

github.com/...nclave/security/advisories/GHSA-x39w-8vm5-5m3p

github.com/...ommit/2fcf5da81e7e2578ede6f94cae4f379165426dca

www.staicu.org/publications/usenixSec2023-SandDriller.pdf

cve.org (CVE-2026-25533)

nvd.nist.gov (CVE-2026-25533)

Download JSON