Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be used to achieve remote code execution (RCE). The issue has been fixed in version 2.11.1.
References
| Link | Resource |
|---|---|
| https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db | Patch |
| https://github.com/agentfront/enclave/security/advisories/GHSA-f229-3862-4942 | Exploit Mitigation Vendor Advisory |
Configurations
History
27 Feb 2026, 18:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:agentfront:enclave:*:*:*:*:*:node.js:*:* | |
| First Time |
Agentfront enclave
Agentfront |
|
| References | () https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db - Patch | |
| References | () https://github.com/agentfront/enclave/security/advisories/GHSA-f229-3862-4942 - Exploit, Mitigation, Vendor Advisory |
25 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 04:16
Updated : 2026-02-27 18:27
NVD link : CVE-2026-27597
Mitre link : CVE-2026-27597
CVE.ORG link : CVE-2026-27597
JSON object : View
Products Affected
agentfront
- enclave
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
