Description
vm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466 is insufficient and can be circumvented allowing attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patched in version 3.10.5.
Published: 2026-05-04
Score: 9.8 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

vm2 is a widely used Node.js virtual machine sandbox. A flaw in the handling of Promises in versions prior to 3.10.5 allows an attacker to inject code that bypasses the sandbox boundary. The vulnerability is based on improper code generation (CWE‑94) and security misconfiguration (CWE‑693). When exploited, the attacker can break out of the isolated VM and execute arbitrary commands on the host system, leading to full system compromise. The impact is limited to environments that instantiate vm2 and expose executable code to untrusted input, but the consequence is catastrophic: confidentiality, integrity, and availability are all jeopardized through remote execution of host‑level code.

Affected Systems

The affected product is patriksimek’s vm2 library, versions earlier than 3.10.5. Users of any Node.js application that relies on vm2 for sandboxing—such as web servers, code execution services, or build tools—must ensure they are running at least version 3.10.5 or later. The advisory provides release notes for v3.10.5 as the fix.

Risk and Exploitability

An estimated CVSS score of 9.8 categorizes this as critical, with a high potential for exploitation. No EPSS data is available, so the current model of exploitation likelihood is unknown, but the flaw is sufficient to read the official advisory that it could be leveraged by an attacker who controls the code executed in the VM. The vulnerability is not listed in the CISA KEV catalog, indicating no known mass exploitation. Nonetheless, the attack vector is inferred to be compromised or malicious sandboxed code—an attacker who can influence the content passed to vm2 poses a substantial threat. The only known mitigation is to apply the patch released in v3.10.5, after which the sandbox boundary is restored and the code execution vector is closed.

Generated by OpenCVE AI on May 4, 2026 at 19:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade vm2 to version 3.10.5 or newer; this releases the definitive patch for the sandbox breakout.
  • If an upgrade is not immediately possible, remove or disable any usage of vm2 in the application, or isolate the sandboxed code in a separate, highly tainted environment with strict execution controls.
  • As an interim precaution, review any exposed sandbox entry points to ensure they cannot inject or alter Promise species; restrict code evaluation to trusted sources only, and employ static analysis to detect malicious patterns.

Generated by OpenCVE AI on May 4, 2026 at 19:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Patriksimek
Patriksimek vm2
Vendors & Products Patriksimek
Patriksimek vm2

Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description vm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466 is insufficient and can be circumvented allowing attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This issue has been patched in version 3.10.5.
Title vm2: Sandbox Breakout Through Promise Species
Weaknesses CWE-693
CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-04T16:31:13.639Z

Reserved: 2026-01-21T18:38:22.473Z

Link: CVE-2026-24120

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:21.813

Modified: 2026-05-04T17:16:21.813

Link: CVE-2026-24120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T21:00:08Z

Weaknesses