CVE-2026-23830
January 27, 2026
SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to "AsyncFunction" not being isolated in "SandboxFunction". The library attempts to sandbox code execution by replacing the global "Function" constructor with a safe, sandboxed version ("SandboxFunction"). This is handled in "utils.ts" by mapping "Function" to "sandboxFunction" within a map used for lookups. However, before version 0.8.26, the library did not include mappings for "AsyncFunction", "GeneratorFunction", and "AsyncGeneratorFunction". These constructors are not global properties but can be accessed via the ".constructor" property of an instance (e.g., "(async () => {}).constructor"). In "executor.ts", property access is handled. When code running inside the sandbox accesses ".constructor" on an async function (which the sandbox allows creating), the "executor" retrieves the property value. Since "AsyncFunction" was not in the safe-replacement map, the "executor" returns the actual native host "AsyncFunction" constructor. Constructors for functions in JavaScript (like "Function", "AsyncFunction") create functions that execute in the global scope. By obtaining the host "AsyncFunction" constructor, an attacker can create a new async function that executes entirely outside the sandbox context, bypassing all restrictions and gaining full access to the host environment (Remote Code Execution). Version 0.8.26 patches this vulnerability.
Affected Packages
https://github.com/nyariv/SandboxJS.git (GITHUB):
Affected version(s) =v0.8.25 <v0.8.26Fix Suggestion:
Update to version v0.8.26@nyariv/sandboxjs (NPM):
Affected version(s) >=0.1.0 <0.8.26Fix Suggestion:
Update to version 0.8.26Related Resources (4)
Do you need more information?
Contact UsCVSS v4
Base Score:
10
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
10
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
EPSS
Base Score:
0.13