Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hg73-4w7g-q96w | SandboxJS: Sandbox Escape via Prop Object Leak in New Handler |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36. | |
| Title | SandboxJS has a Sandbox Escape via Prop Object Leak in New Handler | |
| Weaknesses | CWE-668 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:40:46.653Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34217
Updated: 2026-04-06T15:34:12.211Z
Status : Received
Published: 2026-04-06T16:16:34.890
Modified: 2026-04-06T16:16:34.890
Link: CVE-2026-34217
No data.
OpenCVE Enrichment
No data.
Github GHSA