Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-25142 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SandboxJS < 0.8.27 suffers from **Code Injection** via improper restriction of `__lookupGetter__`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The core flaw is the failure to properly restrict the `__lookupGetter__` method. This oversight creates a backdoor for malicious code to escape the isolated environment.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **SandboxJS** by developer **nyariv**. Specifically, all versions **prior to 0.8.27**. If you are running an older version of this security assessment tool, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Hackers can achieve **Sandbox Escape**. This grants them the ability to execute arbitrary code remotely.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. The CVSS vector indicates **Network** accessible, **Low** complexity, and **No** privileges or user interaction required. It is a critical, easy-to-exploit vulnerability.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“¦ **Public Exploit**: Currently, the **PoCs list is empty** in the provided data. However, given the low exploitation threshold, proof-of-concept code is likely emerging or easily derivable from the technical details.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your installed version of **SandboxJS**. If the version number is **less than 0.8.27**, you are affected. Look for usage of `__lookupGetter__` in custom scripts if you are the developer.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The vulnerability has been addressed. Refer to the GitHub commit `75c8009` and the security advisory `GHSA-9p4w-fq8m-2hp7` for the official patch details.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot upgrade immediately, **disable** the SandboxJS service if not essential. Strictly **sanitize inputs** and avoid executing untrusted scripts that might leverage `__lookupGetter__`.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. With a CVSS score indicating High impact and Low exploitation difficulty, you must **patch immediately** to version 0.8.27 or later to prevent potential RCE attacks.