All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.
Exploiting this vulnerability might result in remote code execution ("RCE").

**Vulnerable functions:**

__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1223 All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
Github GHSA Github GHSA GHSA-79xf-67r4-q2jj safe-eval vulnerable to Sandbox Bypass due to improper input sanitization
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 07 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-02-07T16:56:45.658Z

Reserved: 2023-02-20T10:28:48.923Z

Link: CVE-2023-26122

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.576Z

cve-icon NVD

Status : Modified

Published: 2023-04-11T05:15:07.180

Modified: 2025-02-07T17:15:25.093

Link: CVE-2023-26122

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.