CVE-2026-34217

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nyariv:sandboxjs:*:*:*:*:*:node.js:*:*

History

09 Apr 2026, 18:03

Type Values Removed Values Added
References () https://github.com/nyariv/SandboxJS/security/advisories/GHSA-hg73-4w7g-q96w - () https://github.com/nyariv/SandboxJS/security/advisories/GHSA-hg73-4w7g-q96w - Exploit, Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Nyariv sandboxjs
Nyariv
CPE cpe:2.3:a:nyariv:sandboxjs:*:*:*:*:*:node.js:*:*

06 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 16:16

Updated : 2026-04-09 18:03


NVD link : CVE-2026-34217

Mitre link : CVE-2026-34217

CVE.ORG link : CVE-2026-34217


JSON object : View

Products Affected

nyariv

  • sandboxjs
CWE
CWE-668

Exposure of Resource to Wrong Sphere