The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25142

CVE-2026-25142: SandboxJS RCE Vulnerability

CVE-2026-25142 is a remote code execution flaw in SandboxJS that allows attackers to escape the sandbox through improper __lookupGetter__ restrictions. This post explains its impact, affected versions, and mitigation steps.

Published: February 6, 2026

CVE-2026-25142 Overview

SandboxJS is a JavaScript sandboxing library designed to execute untrusted JavaScript code in a restricted environment. A critical vulnerability exists in versions prior to 0.8.27 where SandboxJS does not properly restrict access to the __lookupGetter__ method. This oversight allows attackers to obtain prototype references, which can be leveraged to escape the sandbox and achieve remote code execution on the host system.

Critical Impact

This sandbox escape vulnerability allows attackers to bypass security restrictions and execute arbitrary code on the underlying system, completely defeating the purpose of the sandboxing mechanism. Applications relying on SandboxJS for secure code execution are at risk of full system compromise.

Affected Products

  • SandboxJS versions prior to 0.8.27
  • Applications using vulnerable SandboxJS versions for untrusted code execution
  • Web applications implementing client-side JavaScript sandboxing with SandboxJS

Discovery Timeline

  • 2026-02-02 - CVE CVE-2026-25142 published to NVD
  • 2026-02-03 - Last updated in NVD database

Technical Details for CVE-2026-25142

Vulnerability Analysis

This vulnerability (CWE-94: Improper Control of Generation of Code) represents a fundamental flaw in how SandboxJS restricts access to JavaScript's prototype chain. The __lookupGetter__ method, when left unrestricted, provides a direct path to traverse the prototype chain and access objects that should be isolated from sandboxed code.

In JavaScript, the prototype chain is the mechanism by which objects inherit properties and methods from their prototypes. Sandboxing libraries must carefully control access to this chain to prevent untrusted code from reaching dangerous objects like Function, Object, or the global scope. The failure to restrict __lookupGetter__ creates a reliable escape primitive that attackers can exploit to break out of the sandbox entirely.

The network-accessible nature of this vulnerability means any application exposing SandboxJS functionality over the network is susceptible to remote exploitation without requiring any user interaction or authentication.

Root Cause

The root cause lies in the conditional logic within the executor.ts file, specifically in how the sandbox validates property access. The original code structure allowed certain code paths to bypass the prototype chain validation when accessing properties that were not the constructor. The vulnerability exists between lines 368-398 of the executor.ts file, where the validation logic failed to properly cover all cases of prototype access.

Attack Vector

An attacker can craft malicious JavaScript code that leverages __lookupGetter__ to traverse up the prototype chain, ultimately obtaining references to unrestricted objects. From these objects, the attacker can access the Function constructor or other dangerous primitives, enabling arbitrary code execution outside the sandbox boundaries.

The attack is particularly dangerous because:

  • It requires no privileges or authentication
  • It can be executed remotely over the network
  • No user interaction is required
  • The scope extends beyond the vulnerable component, potentially impacting the entire host system
typescript
           throw new SandboxError(`Static method or property access not permitted: ${a.name}.${b}`);
         }
       }
-    } else if (b !== 'constructor') {
+    }
+    
+    if (b !== 'constructor') {
       let prot = a;
       while ((prot = Object.getPrototypeOf(prot))) {
         if (prot.hasOwnProperty(b)) {

Source: GitHub SandboxJS Commit

The patch restructures the conditional logic to ensure that prototype chain validation is always performed regardless of the preceding static method check. By changing from an else if to a separate if statement, the validation now covers all code paths properly.

Detection Methods for CVE-2026-25142

Indicators of Compromise

  • Unusual JavaScript execution patterns involving __lookupGetter__ or __lookupSetter__ methods
  • Attempts to access Object.prototype or Function.prototype from sandboxed contexts
  • Unexpected process spawning or system calls originating from Node.js applications using SandboxJS
  • Log entries showing prototype chain traversal attempts within sandbox boundaries

Detection Strategies

  • Implement application-level logging to capture all code submitted to SandboxJS for execution
  • Deploy runtime application self-protection (RASP) solutions to detect sandbox escape attempts
  • Monitor for usage patterns involving deprecated prototype accessor methods (__lookupGetter__, __lookupSetter__, __defineGetter__, __defineSetter__)
  • Review application logs for error messages related to prototype access violations

Monitoring Recommendations

  • Enable verbose logging for SandboxJS execution contexts in development and staging environments
  • Set up alerts for any successful execution of code containing prototype manipulation methods
  • Monitor system resource usage for applications using SandboxJS to detect potential post-exploitation activity
  • Implement anomaly detection for JavaScript execution patterns that differ from baseline behavior

How to Mitigate CVE-2026-25142

Immediate Actions Required

  • Upgrade SandboxJS to version 0.8.27 or later immediately
  • Audit all applications using SandboxJS to identify vulnerable deployments
  • Implement input validation to reject code containing __lookupGetter__ patterns as a temporary measure
  • Consider temporarily disabling features that execute untrusted JavaScript until patching is complete

Patch Information

The vulnerability has been fixed in SandboxJS version 0.8.27. The security patch modifies the conditional logic in src/executor.ts to ensure prototype chain validation is performed consistently across all code paths. Organizations should update their dependencies to include this fix.

For detailed patch information, refer to the GitHub Security Advisory GHSA-9p4w-fq8m-2hp7 and the security commit.

Workarounds

  • If immediate patching is not possible, implement a pre-execution filter that blocks code containing __lookupGetter__, __lookupSetter__, and similar prototype accessor methods
  • Deploy network-level controls to restrict access to applications using vulnerable SandboxJS versions
  • Consider using alternative sandboxing solutions such as isolated VMs or Web Workers with restricted capabilities until the upgrade can be completed
  • Implement Content Security Policy (CSP) headers to limit the impact of potential sandbox escapes in browser contexts
bash
# Update SandboxJS to patched version
npm update sandboxjs@0.8.27

# Verify installed version
npm list sandboxjs

# Audit for additional vulnerabilities
npm audit

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSandboxjs

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Technical References
  • GitHub SandboxJS Code Snippet

  • GitHub SandboxJS Commit History

  • GitHub Security Advisory GHSA-9p4w-fq8m-2hp7
  • Related CVEs
  • CVE-2026-25881: SandboxJS Sandbox Escape RCE Vulnerability

  • CVE-2026-25587: SandboxJS RCE Vulnerability

  • CVE-2026-25520: SandboxJS RCE Vulnerability

  • CVE-2026-25586: SandboxJS Sandbox Escape RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English