<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(socket.dev) Critical Sandbox Escape Vulnerability in vm2 JavaScript Library Exposes Node.js Applications to Arbitrary Command Execution]]></title><description><![CDATA[<p>(socket.dev) Critical Sandbox Escape Vulnerability in vm2 JavaScript Library Exposes Node.js Applications to Arbitrary Command Execution</p><p>Critical sandbox escape in vm2 (CVE-2026-26956, GHSA-ffh4-j6h5-pg66) enables arbitrary command execution via WebAssembly.JSTag in Node.js applications. Affects vm2 0.2.2–3.10.4 on runtimes exposing WebAssembly.JSTag.</p><p>In brief - A critical flaw in the vm2 JavaScript sandboxing library allows attackers to bypass sandbox restrictions, access the host Node.js process, and execute arbitrary OS commands. The vulnerability impacts 66 versions of vm2 and requires immediate patching or mitigation via Certified Patches.</p><p>Technically - The vulnerability stems from insufficient isolation of WebAssembly.JSTag in vm2’s sandbox, allowing malicious JavaScript passed to VM.run() to escape and interact with the host process. Fixed in vm2 3.10.5 by removing WebAssembly.JSTag from the sandbox. Socket’s Certified Patches offer a targeted fix for teams unable to upgrade immediately. Review sandboxed workloads for least-privilege access and stronger isolation.</p><p>Source: <a href="https://socket.dev/blog/free-certified-patches-for-critical-vm2-sandbox-escape" rel="nofollow noopener"><span>https://</span><span>socket.dev/blog/free-certified</span><span>-patches-for-critical-vm2-sandbox-escape</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/0624c86d-bbe4-46c2-869d-de56f9595d64/socket.dev-critical-sandbox-escape-vulnerability-in-vm2-javascript-library-exposes-node.js-applications-to-arbitrary-command-execution</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:18:10 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0624c86d-bbe4-46c2-869d-de56f9595d64.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 06:38:12 GMT</pubDate><ttl>60</ttl></channel></rss>