| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-47x8-96vw-5wg6 | vm2 Access to Host Object Enables Sandbox Escape |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0. | |
| Title | vm2: Sandbox Escape | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T03:56:41.615Z
Reserved: 2026-05-04T20:24:31.917Z
Link: CVE-2026-43997
Updated: 2026-05-13T18:40:07.880Z
Status : Undergoing Analysis
Published: 2026-05-13T18:16:16.177
Modified: 2026-05-13T19:17:25.613
Link: CVE-2026-43997
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z
Github GHSA