vm2 Sandbox Escape (CVE-2026-43997) Exposes Node.js Hosts

vm2 Sandbox Escape (CVE-2026-43997) Exposes Node.js Hosts

The National Vulnerability Database has issued a critical advisory for CVE-2026-43997, a severe vulnerability in vm2, an open-source sandbox for Node.js. This flaw, present in versions prior to 3.11.0, allows an attacker to escape the sandbox environment and gain access to the host Object. This is a full sandbox bypass, enabling arbitrary code execution on the underlying system.

The mechanism involves leveraging the host Object — specifically, an example cited by the National Vulnerability Database is the use of HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This technique effectively breaks the isolation vm2 is designed to provide, rendering any security assumptions based on its sandbox invalid. The vulnerability carries a CVSS score of 10.0 (CRITICAL).

This is not a theoretical flaw; it’s a direct path to host compromise. Any application using vm2 for untrusted code execution, such as serverless functions, plugin architectures, or code playgrounds, is at extreme risk. The fix is available in vm2 version 3.11.0, and immediate upgrade is the only viable mitigation.

What This Means For You

  • If your Node.js applications use `vm2` to execute untrusted code, you are exposed to full host compromise. Check your dependencies immediately. Upgrade `vm2` to version 3.11.0 or later RIGHT NOW. If you cannot upgrade, isolate these applications completely and consider alternative sandboxing solutions.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1059.001 Execution

vm2 Sandbox Escape Attempt via Host Object Access - CVE-2026-43997

Sigma YAML — free preview
title: vm2 Sandbox Escape Attempt via Host Object Access - CVE-2026-43997
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
  Detects attempts to exploit CVE-2026-43997 by looking for Node.js processes executing commands that reference the specific Symbol used in known exploitation techniques to access the host object and escape the vm2 sandbox.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-43997/
tags:
  - attack.execution
  - attack.t1059.001
logsource:
    category: process_creation
detection:
  selection:
      Image|contains:
          - 'node.exe'
      CommandLine|contains:
          - 'Symbol(nodejs.util.inspect.custom)'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-43997 Sandbox Escape vm2 Node.js sandbox library
CVE-2026-43997 Sandbox Escape vm2 versions prior to 3.11.0
CVE-2026-43997 Sandbox Escape Obtaining the host Object within vm2
CVE-2026-43997 Sandbox Escape Exploiting HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom)
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 13, 2026 at 21:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44351: Critical fast-jwt Auth Bypass via Empty Key

CVE-2026-44351 — fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.4, a critical authentication-bypass vulnerability in fast-jwt's async key-resolver flow allows any unauthenticated...

vulnerabilityCVEcriticalhigh-severitycwe-287cwe-326cwe-1391
/SCW Vulnerability Desk /CRITICAL /9.1 /⚑ 3 IOCs /⚙ 6 Sigma

CVE-2026-42552: Flight PHP Framework Leaks Critical Server Info

CVE-2026-42552 — Flight is an extensible micro-framework for PHP. Prior to 3.18.1, the default error handler Engine::_error() writes the full exception message, exception code, and...

vulnerabilityCVEhigh-severitypath-traversalcwe-209
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 3 IOCs /⚙ 2 Sigma

Flight PHP Framework CVE-2026-42551: CSRF & Cache Poisoning Risk

CVE-2026-42551 — Flight is an extensible micro-framework for PHP. Prior to 3.18.1, Request::getMethod() unconditionally honors the X-HTTP-Method-Override header and the $_REQUEST['_method'] parameter on any HTTP...

vulnerabilityCVEhigh-severitycwe-436
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs /⚙ 3 Sigma