Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-26954 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SandboxJS < 0.8.34 has a **Code Injection** flaw.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The software allows input that results in an array containing `Function` objects. This bypasses security controls and enables arbitrary code execution. ⚠️

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **SandboxJS** by developer **nyariv**. πŸ“¦ **Version**: All versions **prior to 0.8.34**. If you are running 0.8.33 or lower, you are vulnerable!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With **No Privileges** required, hackers can execute arbitrary code. They gain **High** access to sensitive data, can modify system integrity, and cause complete service disruption. πŸŒͺ️

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. CVSS indicates **Network** accessible, **Low** complexity, and **No** authentication/UI interaction needed. It is a remote, unauthenticated attack vector. 🎯

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: **No** public PoC or wild exploitation detected yet (POCs list is empty). However, the vulnerability is confirmed via GitHub Advisory. πŸ•΅οΈβ€β™‚οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your installed version of SandboxJS. If version < **0.8.34**, you are at risk. Look for configurations allowing `Function` arrays in input data. πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The vendor (nyariv) has issued a security advisory. Upgrade to version **0.8.34** or later to patch the code injection flaw. πŸ”„

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch Workaround**: If you cannot upgrade immediately, **strictly sanitize inputs**. Ensure no `Function` objects or code-like strings are processed in arrays. Disable unnecessary network exposure. 🧱

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is **Critical** (implied by H/H/H metrics). Remote code execution without auth is a top-priority fix. Patch immediately! πŸš‘