The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-32792

CVE-2025-32792: SES Compartment API XSS Vulnerability

CVE-2025-32792 is a cross-site scripting vulnerability in SES Compartment API that exposes lexical bindings to third-party code. This article covers the technical details, affected versions, security impact, and mitigation.

Published: May 11, 2026

CVE-2025-32792 Overview

CVE-2025-32792 affects Secure ECMAScript (SES), a JavaScript runtime library that executes third-party 'strict' mode programs in isolated compartments. The vulnerability allows third-party code evaluated inside a Compartment to observe top-level let, const, and class bindings declared in <script> tags on the host page. This breaks the isolation guarantee that SES provides to web pages and web extensions. The flaw is tracked under CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere. The maintainers patched the issue in ses version 1.12.0.

Critical Impact

Third-party code running inside an SES compartment can read host-page lexical bindings that were intended to remain private, defeating the isolated execution boundary.

Affected Products

  • ses package versions prior to 1.12.0
  • Web pages using the SES Compartment API with top-level let, const, or class declarations in <script> tags
  • Web extensions relying on SES to sandbox third-party JavaScript

Discovery Timeline

  • 2025-04-18 - CVE-2025-32792 published to NVD
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-32792

Vulnerability Analysis

SES (Secure ECMAScript) provides the Compartment API to evaluate untrusted JavaScript in an isolated lexical and global scope. The isolation contract states that code inside a compartment should only see bindings explicitly provided through the compartment's global scope.

The vulnerability breaks this contract. When a host page declares variables using let, const, or class at the top level of a <script> tag, those declarations populate the script's lexical scope rather than globalThis. Prior to version 1.12.0, SES inadvertently exposed this lexical scope to code running inside compartments. Third-party scripts could read identifiers that the page author assumed were private.

The issue carries an EPSS score of 0.866% with a percentile of 75.242, indicating moderate exploitation likelihood relative to other CVEs.

Root Cause

The root cause is improper isolation between the host page's lexical environment and the compartment's evaluation scope. ECMAScript stores top-level let, const, and class bindings in a script-level Lexical Environment record, distinct from the global object. SES did not fully sever this lexical chain when constructing compartment evaluators, leaving the host bindings reachable through the lexical scope walk performed by guest code.

Attack Vector

An attacker supplies untrusted JavaScript that a page evaluates inside an SES Compartment. The guest code references identifier names that match host-page let, const, or class declarations. Because these bindings leak into the compartment's lexical scope, the guest reads their values directly. The attack requires no privileges and no user interaction, and the vector is network-reachable through any standard JavaScript delivery path such as third-party widgets, advertising scripts, or browser extension content scripts.

The vulnerability mechanism is documented in the GitHub Security Advisory GHSA-h9w6-f932-gq62. No public proof-of-concept exploit is currently listed.

Detection Methods for CVE-2025-32792

Indicators of Compromise

  • Third-party scripts in compartments referencing identifier names that match host-page top-level let, const, or class declarations
  • Unexpected network exfiltration of values that mirror host-page variable names
  • Web extension content scripts reading data they were not explicitly granted

Detection Strategies

  • Audit application dependencies for ses versions earlier than 1.12.0 using npm ls ses or equivalent lockfile inspection
  • Static-analysis scanning of <script> tags for top-level let, const, and class declarations in pages that also instantiate Compartment
  • Review code-review pipelines for use of the SES Compartment API together with lexically scoped top-level bindings

Monitoring Recommendations

  • Track Content Security Policy (CSP) violation reports and outbound requests from pages that load third-party scripts inside SES compartments
  • Log compartment evaluation calls and the source URLs of guest code for forensic review
  • Subscribe to the endojs/endo security advisories feed for follow-up disclosures

How to Mitigate CVE-2025-32792

Immediate Actions Required

  • Upgrade the ses package to version 1.12.0 or later across all production and development environments
  • Inventory all web pages and web extensions that evaluate third-party code through the Compartment API
  • Rotate any secrets or tokens that may have been declared as top-level let or const bindings on affected pages

Patch Information

The maintainers fixed the lexical scope leak in ses version 1.12.0. Refer to the GitHub Security Advisory GHSA-h9w6-f932-gq62 for patch commit details and release notes published by the endojs project.

Workarounds

  • Avoid top-level let, const, and class declarations in <script> tags on pages that use SES compartments
  • Convert affected declarations to var, which binds to globalThis and is governed by the compartment's explicit global isolation
  • Move sensitive bindings into an IIFE (Immediately Invoked Function Expression) so they are not reachable from the script-level lexical environment
bash
# Upgrade ses to the patched version
npm install ses@^1.12.0

# Verify the installed version
npm ls ses

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechSes

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.87%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-497
  • Technical References
  • GitHub Security Advisory
  • Latest CVEs
  • CVE-2026-8468: Elixir Plug Library DoS Vulnerability

  • CVE-2026-8295: simdjson Information Disclosure Vulnerability

  • CVE-2025-68421: Comarch ERP Optima Auth Bypass Vulnerability

  • CVE-2025-68420: Comarch ERP Optima Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English