Home

Description

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers have an execution-quota bypass. A global tick state (`currentTicks.current`) is shared between sandboxes. Timer string handlers are compiled at execution time using that global tick state rather than the scheduling sandbox's tick object. In multi-tenant / concurrent sandbox scenarios, another sandbox can overwrite `currentTicks.current` between scheduling and execution, causing the timer callback to run under a different sandbox's tick budget and bypass the original sandbox's execution quota/watchdog. Version 0.8.35 fixes this issue.

PUBLISHED Reserved 2026-03-13 | Published 2026-03-18 | Updated 2026-03-19 | Assigner GitHub_M




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Product status

< 0.8.35
affected

References

github.com/...dboxJS/security/advisories/GHSA-7p5m-xrh7-769r

github.com/...ommit/cc8f20b4928afed5478d5ad3d1737ef2dcfaac29

cve.org (CVE-2026-32723)

nvd.nist.gov (CVE-2026-32723)

Download JSON