vm2 Sandbox Escape (CVE-2026-45411) Poses Critical RCE Risk
A critical vulnerability, CVE-2026-45411, has been identified in vm2, an open-source sandbox for Node.js. The National Vulnerability Database reports that prior to version 3.11.3, an attacker can exploit a flaw in how vm2 handles host exceptions within async generators. Specifically, the yield* expression allows for catching host exceptions, and when the generator is closed, exceptions thrown during the then call are passed back to the iterator as the next value.
This intricate exception handling bypass enables attackers to break out of the vm2 sandbox. Once outside, they can execute arbitrary commands on the host system, leading to a complete compromise. The National Vulnerability Database assigns this a CVSS score of 9.8 (CRITICAL), underscoring the severity and ease of exploitation, as it requires no privileges or user interaction.
Organizations leveraging vm2 in their Node.js environments are at severe risk. This isn’t just a denial-of-service; it’s a full remote code execution vector. The fix is available in vm2 version 3.11.3, making immediate patching the only viable defense against this critical escape.
What This Means For You
- If your Node.js applications use vm2, you are exposed to a critical sandbox escape (CVE-2026-45411) that allows arbitrary code execution. Identify all instances of vm2 in your deployments and upgrade to version 3.11.3 or later *immediately*. This isn't a theoretical risk; it's a direct path to host compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-45411 - vm2 Sandbox Escape via Async Generator Exception Handling
title: CVE-2026-45411 - vm2 Sandbox Escape via Async Generator Exception Handling
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
This rule detects the specific exploit pattern for CVE-2026-45411. It looks for Node.js processes ('node.exe') that are likely running the vm2 sandbox and attempting to exploit the vulnerability by using 'yield*' within an async generator and closing the generator with 'return()'. This indicates an attempt to escape the sandbox and execute arbitrary commands on the host.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45411/
tags:
- attack.execution
- attack.t1059.003
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'node.exe'
CommandLine|contains:
- 'vm2'
- 'yield*'
- 'return()'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45411 | RCE | vm2 sandbox escape |
| CVE-2026-45411 | RCE | vm2 < 3.11.3 |
| CVE-2026-45411 | RCE | Node.js vm/sandbox |
| CVE-2026-45411 | RCE | yield* expression inside an async generator |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 21:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.