Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-25587 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SandboxJS < 0.8.29 has a critical flaw allowing **Sandbox Escape**. πŸ“‰ **Consequences**: Attackers can break out of the isolated environment, leading to full system compromise.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-94**: Improper Control of Generation of Code ('Code Injection'). πŸ’₯ **Flaw**: The vulnerability stems from **overwriting `Map.prototype.has`**.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: nyariv. πŸ“¦ **Product**: SandboxJS (Security Assessment Tool). πŸ“… **Affected**: Versions **prior to 0.8.29**. If you are running an older build, you are exposed.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: High. The CVSS score indicates **Complete** impact on Confidentiality, Integrity, and Availability. πŸ—οΈ **Data**: Attackers gain unrestricted access, effectively bypassing the security sandbox entirely.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Low. CVSS Vector `AV:N/AC:L/PR:N/UI:N` means: **Network** accessible, **Low** complexity, **No** privileges required, **No** user interaction needed. It’s a remote, automated exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp?**: No PoCs listed in the data yet. 🌐 **References**: Official advisory and commit fix are public.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan your environment for **SandboxJS** installations. πŸ“Š **Version Control**: Verify if the installed version is **< 0.8.29**. If yes, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ› οΈ **Patch**: Version **0.8.29** and above are safe. πŸ”— **Commit**: Fix is available at `67cb186c41c78c51464f70405504e8ef0a6e43c3`. Update immediately to the latest release.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: If you cannot update, **isolate** the SandboxJS instance. 🚫 **Network**: Restrict network access to prevent remote exploitation.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. With `S:C` (Changed Scope) and high CVSS, this is a top-priority fix. πŸƒ **Action**: Patch now. Do not wait for an exploit to appear. The risk of total compromise is immediate.