Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-25586 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SandboxJS < 0.8.29 has a **Sandbox Escape** flaw. πŸ›‘ **Consequences**: Attackers bypass security controls, pollute `Object.prototype`, and cause persistent cross-sandbox damage. πŸ’₯

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: **CWE-74** (Improper Neutralization). The flaw stems from **masking `hasOwnProperty`** on the sandbox object.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **SandboxJS** by developer **nyariv**. πŸ“¦ **Version**: All versions **prior to 0.8.29**. ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full **Privilege Escalation** within the sandbox. They can access **`__proto__`**, pollute global objects, and execute **Cross-Sandbox Attacks**. 🌐

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Exploitation Threshold**: **LOW**. CVSS indicates **AV:N** (Network), **AC:L** (Low Complexity), **PR:N** (No Privileges), **UI:N** (No User Interaction). Easy to exploit remotely! πŸš€

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“‚ **Public Exploit**: **No**. The `pocs` field is empty. 🚫 While the flaw is clear, no public PoC or wild exploitation code is currently available. πŸ•΅οΈ

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for **SandboxJS** installations. Check version numbers. Look for usage of `hasOwnProperty` without proper isolation in custom sandbox implementations. πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. Patched in **version 0.8.29**. πŸ› οΈ Reference: GitHub commit `67cb186` and GHSA advisory `GHSA-jjpw-65fv-8g48`. πŸ”—

Q9What if no patch? (Workaround)

πŸ›‘οΈ **No Patch Workaround**: **Not Recommended**. Since it allows prototype pollution, temporary mitigations are risky. **Upgrade immediately** if possible. If stuck, isolate the environment strictly. 🧱

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS Score is **High** (likely 9.8+). Network-accessible, no auth needed, and causes severe data integrity issues. Patch NOW! ⏳