Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-34208 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SandboxJS 0.8.36- has a critical flaw allowing **constructor path bypass**. πŸ“‰ **Consequences**: Attackers can modify the **host global object properties**, breaking the security sandbox entirely.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-693**: Protection Mechanism Failure. The **global object protection** is flawed. The vulnerability stems from **constructor path manipulation**, bypassing intended safeguards.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Vendor**: nyariv. πŸ“¦ **Product**: SandboxJS. ⚠️ **Affected**: Versions **0.8.36 and earlier**. If you use this security assessment tool, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: High. Hackers can **modify host global object attributes**. This breaks isolation, potentially leading to **full environment compromise** or data leakage within the sandboxed context.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. CVSS indicates **AV:N** (Network), **AC:L** (Low Complexity), **PR:N** (No Privileges), **UI:N** (No User Interaction). Easy to exploit remotely without auth.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exp?**: **No**. The `pocs` array is empty. No public Proof-of-Concept or wild exploitation code is currently available, though the flaw is clear.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Check your SandboxJS version. If it is **< 0.8.36**, you are vulnerable. Use package managers or `npm list` to verify installed versions immediately.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: Yes. The advisory (GHSA-2gg9-6p7w-6cpj) confirms the issue. **Upgrade to version 0.8.36 or later** to apply the official patch and restore protection.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: If stuck on old versions, **isolate the environment**. Restrict network access to the SandboxJS instance. Monitor for unexpected global object changes. Treat it as **untrusted input**.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score implies **Critical Impact** (C:H, I:H). Despite no public PoC, the low exploitation barrier makes it a prime target. **Patch immediately**.