Impact
vm2, an open source VM/sandbox for Node.js, has a vulnerability that allows attackers to escape the sandbox through the inspect function. This flaw lets an attacker write and run code that bypasses the VM2 boundary and triggers arbitrary command execution on the host system. The weakness demonstrates improper isolation and code execution controls, which are mapped to CWE‑693 and CWE‑94.
Affected Systems
The issue affects the patriksimek:vm2 product. Any installation of vm2 prior to version 3.11.0 is vulnerable. Version 3.11.0 and later contain the fix.
Risk and Exploitability
The CVSS score of 9.8 reflects high severity with complete availability, integrity, and confidentiality compromise. EPSS data is unavailable, so current exploit likelihood cannot be quantified, but the absence of a KEV listing does not diminish the risk. The likely attack vector is through a Node.js application that incorporates vm2, where an adversary can inject malicious payloads into the inspect interface to break out of the sandbox and execute system commands.
OpenCVE Enrichment