CVE-2026-27597

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be used to achieve remote code execution (RCE). The issue has been fixed in version 2.11.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agentfront:enclave:*:*:*:*:*:node.js:*:*

History

27 Feb 2026, 18:27

Type Values Removed Values Added
CPE cpe:2.3:a:agentfront:enclave:*:*:*:*:*:node.js:*:*
First Time Agentfront enclave
Agentfront
References () https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db - () https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db - Patch
References () https://github.com/agentfront/enclave/security/advisories/GHSA-f229-3862-4942 - () https://github.com/agentfront/enclave/security/advisories/GHSA-f229-3862-4942 - Exploit, Mitigation, Vendor Advisory

25 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 04:16

Updated : 2026-02-27 18:27


NVD link : CVE-2026-27597

Mitre link : CVE-2026-27597

CVE.ORG link : CVE-2026-27597


JSON object : View

Products Affected

agentfront

  • enclave
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')