vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-47x8-96vw-5wg6 | vm2 Access to Host Object Enables Sandbox Escape |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Patriksimek
Patriksimek vm2 |
|
| Vendors & Products |
Patriksimek
Patriksimek vm2 |
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0. | |
| Title | vm2: Sandbox Escape | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T18:40:13.831Z
Reserved: 2026-05-04T20:24:31.917Z
Link: CVE-2026-43997
No data.
Status : Undergoing Analysis
Published: 2026-05-13T18:16:16.177
Modified: 2026-05-13T19:17:25.613
Link: CVE-2026-43997
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:00:04Z
Weaknesses
Github GHSA