The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25520

CVE-2026-25520: SandboxJS RCE Vulnerability

CVE-2026-25520 is a remote code execution flaw in SandboxJS that allows attackers to escape the sandbox and execute arbitrary code. This post covers the technical details, affected versions, and mitigation steps.

Published: February 13, 2026

CVE-2026-25520 Overview

CVE-2026-25520 is a critical sandbox escape vulnerability in SandboxJS, a JavaScript sandboxing library used for executing untrusted code in isolated environments. Prior to version 0.8.29, the library fails to properly wrap return values of functions, allowing attackers to access the host environment's Function constructor and execute arbitrary code outside of the sandbox boundaries.

Critical Impact

This vulnerability allows complete sandbox escape, enabling attackers to execute arbitrary code in the host environment with full privileges, effectively negating all sandboxing protections.

Affected Products

  • SandboxJS versions prior to 0.8.29
  • Applications utilizing SandboxJS for JavaScript code isolation
  • Web applications and Node.js services implementing SandboxJS sandboxing

Discovery Timeline

  • 2026-02-06 - CVE CVE-2026-25520 published to NVD
  • 2026-02-06 - Last updated in NVD database

Technical Details for CVE-2026-25520

Vulnerability Analysis

This vulnerability stems from an improper neutralization of special elements (CWE-74) in how SandboxJS handles function return values. The library is designed to create a secure JavaScript execution environment by wrapping and proxying all interactions between sandboxed code and the host environment. However, the return values from certain built-in functions were not properly wrapped, creating a pathway to escape the sandbox.

Specifically, the Object.values() and Object.entries() methods return Arrays that contain references to host objects without proper wrapping. By leveraging Array.prototype.at(), an attacker can access these unwrapped elements and ultimately obtain a reference to the host's Function constructor. With access to the Function constructor, arbitrary code execution outside the sandbox becomes trivial.

Root Cause

The root cause lies in incomplete coverage of the sandbox wrapper logic. While SandboxJS properly intercepts and wraps many JavaScript operations, the return values from Object.values() and Object.entries() were returned directly to sandboxed code without being processed through the security wrapper. This oversight allowed untrusted code to obtain direct references to host environment objects, including the critical Function constructor which serves as an escape hatch from any JavaScript sandbox.

Attack Vector

The attack is network-accessible and requires no authentication or user interaction. An attacker who can submit JavaScript code for sandboxed execution can exploit this vulnerability to escape the sandbox and execute arbitrary code in the host environment. The attack chain involves:

  1. Using Object.values() or Object.entries() on an object containing function references
  2. Accessing the unwrapped Function object from the returned Array using Array.prototype.at()
  3. Obtaining the host's Function constructor from the unwrapped function
  4. Creating and executing arbitrary functions in the host context

The security patch introduces additional scope management and reserved word handling to prevent access to the host Function constructor:

typescript
   IOptionParams,
   IOptions,
   IScope,
+  LocalScope,
   replacementCallback,
   SandboxGlobal,
   SubscriptionSubject,

Source: GitHub Commit Changes

typescript
 import unraw from './unraw.js';
-import { CodeString, isLisp, LispType } from './utils.js';
+import { CodeString, isLisp, LispType, reservedWords } from './utils.js';
 
 export type DefineLisp<
   op extends LispType,

Source: GitHub Commit Changes

Detection Methods for CVE-2026-25520

Indicators of Compromise

  • Unexpected code execution or process spawning from applications using SandboxJS
  • Log entries showing access to Object.values(), Object.entries(), or Array.prototype.at() in sandboxed contexts followed by suspicious activity
  • Network connections or file system access originating from sandboxed code execution environments
  • Attempts to access or invoke the Function constructor from within sandboxed code

Detection Strategies

  • Monitor for JavaScript code patterns attempting to chain Object.values()/Object.entries() with Array.prototype.at() in sandboxed execution contexts
  • Implement runtime analysis to detect attempts to access the Function constructor from within sandbox boundaries
  • Deploy application-level logging to track all sandboxed code execution and flag suspicious object access patterns
  • Use static analysis on submitted code to identify potential sandbox escape attempts before execution

Monitoring Recommendations

  • Enable verbose logging for all SandboxJS execution contexts to capture attempted exploitation
  • Implement alerting for any sandbox execution that results in host-level resource access
  • Deploy endpoint detection to identify post-exploitation behaviors such as unauthorized network access or file operations
  • Review application logs for repeated sandbox execution failures which may indicate exploitation attempts

How to Mitigate CVE-2026-25520

Immediate Actions Required

  • Upgrade SandboxJS to version 0.8.29 or later immediately across all affected systems
  • Audit all applications using SandboxJS to identify deployment locations requiring updates
  • Consider temporarily disabling sandboxed code execution capabilities until patching is complete
  • Review recent sandbox execution logs for signs of exploitation attempts

Patch Information

The vulnerability has been fixed in SandboxJS version 0.8.29. The patch introduces a LocalScope type and enhanced reserved word handling to properly wrap all return values and prevent access to the host Function constructor. The fix is available in commit 67cb186c41c78c51464f70405504e8ef0a6e43c3.

For detailed patch information, see the GitHub Security Advisory GHSA-58jh-xv4v-pcx4 and the GitHub Commit Changes.

Workarounds

  • Implement additional input validation to block code containing Object.values, Object.entries, or Array.prototype.at patterns until patching is possible
  • Deploy network segmentation to limit the impact of potential sandbox escape by restricting host environment capabilities
  • Consider using alternative sandboxing solutions with stronger isolation guarantees (e.g., WebAssembly, isolated VM processes) for highly sensitive use cases
  • Apply strict Content Security Policy headers to limit capabilities available to potentially escaped code in web contexts
bash
# Update SandboxJS to patched version
npm update sandboxjs@0.8.29

# Verify installed version
npm list sandboxjs

# Audit for vulnerable versions across project
npm audit

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSandboxjs

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-74
  • Technical References
  • GitHub Commit Changes

  • GitHub Security Advisory GHSA-58jh-xv4v-pcx4
  • Related CVEs
  • CVE-2026-25881: SandboxJS Sandbox Escape RCE Vulnerability

  • CVE-2026-25587: SandboxJS RCE Vulnerability

  • CVE-2026-25586: SandboxJS Sandbox Escape RCE Vulnerability

  • CVE-2026-25142: SandboxJS RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English