Home

Description

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into the sandbox. This can be used to get host objects and get the host Function object. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This vulnerability is fixed in 3.11.2.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-13 | Updated 2026-05-15 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

< 3.11.2
affected

References

github.com/...ek/vm2/security/advisories/GHSA-9qj6-qjgg-37qq

cve.org (CVE-2026-44008)

nvd.nist.gov (CVE-2026-44008)

Download JSON