SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map is in SAFE_PROTOYPES, it's prototype can be obtained via Map.prototype. By overwriting Map.prototype.has the sandbox can be escaped. This vulnerability is fixed in 0.8.29.
References
| Link | Resource |
|---|---|
| https://github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3 | Patch |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp | Exploit Vendor Advisory |
| https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp | Exploit Vendor Advisory |
Configurations
History
18 Feb 2026, 14:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Nyariv sandboxjs
Nyariv |
|
| CPE | cpe:2.3:a:nyariv:sandboxjs:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/nyariv/SandboxJS/commit/67cb186c41c78c51464f70405504e8ef0a6e43c3 - Patch | |
| References | () https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp - Exploit, Vendor Advisory |
06 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/nyariv/SandboxJS/security/advisories/GHSA-66h4-qj4x-38xp - |
06 Feb 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 20:16
Updated : 2026-02-18 14:31
NVD link : CVE-2026-25587
Mitre link : CVE-2026-25587
CVE.ORG link : CVE-2026-25587
JSON object : View
Products Affected
nyariv
- sandboxjs
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
