The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26332

CVE-2026-26332: Vm2 Sandbox Escape RCE Vulnerability

CVE-2026-26332 is a sandbox escape RCE vulnerability in Vm2 for Node.js that allows attackers to execute arbitrary code. This article covers the technical details, affected versions below 3.11.0, and mitigation.

Published: May 7, 2026

CVE-2026-26332 Overview

CVE-2026-26332 is a sandbox escape vulnerability in vm2, an open source virtual machine and sandbox library for Node.js. Versions prior to 3.11.0 mishandle the SuppressedError global introduced by the ECMAScript explicit resource management proposal. Attackers who supply untrusted code to a vm2 sandbox can break the isolation boundary and execute arbitrary code in the host Node.js process. The maintainers patched the issue in version 3.11.0. The flaw is classified under CWE-94: Improper Control of Generation of Code.

Critical Impact

Attackers escape the vm2 sandbox and achieve arbitrary code execution on the host, fully compromising any application that evaluates untrusted code through vm2.

Affected Products

  • vm2 versions prior to 3.11.0
  • Node.js applications embedding vm2 for untrusted code evaluation
  • Server-side platforms using vm2 as an isolation primitive (function-as-a-service runtimes, online code editors, scripting hosts)

Discovery Timeline

  • 2026-05-04 - CVE-2026-26332 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-26332

Vulnerability Analysis

vm2 virtualizes a Node.js context and proxies host objects so that sandboxed scripts cannot reach internal Node.js APIs. The library wraps prototypes, intrinsics, and error types to prevent guest code from obtaining a reference to a host-realm object. The vulnerability arises because SuppressedError, a relatively new built-in error constructor, was not included in the set of intrinsics that vm2 sanitizes. When sandboxed code triggers the constructor, the resulting error object retains a prototype chain that crosses the sandbox boundary.

Once guest code obtains a host-realm prototype, it can walk the chain to reach Function, construct arbitrary functions in the host realm, and invoke process, require, or other Node.js APIs. The result is full arbitrary code execution outside the sandbox under the privileges of the Node.js process. The attack does not require authentication or user interaction and is reachable over the network whenever an application accepts untrusted scripts.

Root Cause

The root cause is incomplete coverage of JavaScript intrinsics in the vm2 proxy layer. SuppressedError was added to the language specification after vm2's isolation logic was written, and the constructor was not patched into the sandboxed global. This omission lets guest code obtain an unsandboxed object whose prototype references cross-realm internals. CWE-94 applies because the flaw enables generation and execution of attacker-controlled code in a privileged context.

Attack Vector

Exploitation requires only the ability to submit JavaScript to a vm2 sandbox. An attacker crafts a payload that instantiates SuppressedError, retrieves its constructor or prototype, and uses the leaked reference to obtain process or require. From there the attacker executes shell commands, reads files, opens network sockets, or pivots into the wider environment. Because the issue is reachable from any code path that calls vm.run() on attacker input, exploitation is trivial in deployments that use vm2 to evaluate user-supplied scripts.

No verified public proof-of-concept code is referenced in the advisory. See the GitHub Security Advisory GHSA-55hx-c926-fr95 for vendor technical details.

Detection Methods for CVE-2026-26332

Indicators of Compromise

  • Unexpected child processes spawned by the Node.js process hosting vm2, particularly shells (/bin/sh, cmd.exe) or interpreters (python, curl, wget).
  • Outbound network connections from the Node.js host to unfamiliar destinations shortly after sandboxed script execution.
  • Sandboxed scripts that reference SuppressedError, walk __proto__, constructor, or prototype chains, or attempt to access process, require, or global.
  • File reads or writes outside the application's normal working directory by the Node.js process.

Detection Strategies

  • Inventory all Node.js applications and identify any dependency on vm2 at versions below 3.11.0 using software composition analysis or npm ls vm2.
  • Inspect submitted sandbox scripts for tokens such as SuppressedError, constructor.constructor, or process.mainModule and alert on matches.
  • Compare runtime process trees against a baseline so any non-Node child process spawned from the application is flagged.

Monitoring Recommendations

  • Enable EDR process-lineage telemetry on hosts running Node.js services that embed vm2.
  • Forward Node.js application logs and host process events to a SIEM and correlate sandbox execution with subsequent process creation.
  • Apply egress filtering and alert on outbound traffic from sandbox-hosting workloads to non-allowlisted destinations.

How to Mitigate CVE-2026-26332

Immediate Actions Required

  • Upgrade vm2 to version 3.11.0 or later in every affected Node.js project and rebuild dependent images.
  • Audit applications that pass untrusted input to vm2 and temporarily disable those features until the patched release is deployed.
  • Rotate any secrets accessible to the Node.js process if untrusted scripts were processed by a vulnerable build.

Patch Information

The maintainers fixed the issue in vm2 release v3.11.0. Update the dependency with npm install vm2@^3.11.0 or the equivalent yarn or pnpm command, then redeploy. The vendor advisory is published at GHSA-55hx-c926-fr95. Note that the vm2 project has been deprecated by its maintainer; teams should plan migration to a supported isolation mechanism such as isolated-vm or out-of-process sandboxing.

Workarounds

  • Move untrusted script execution into a separate OS process with reduced privileges and resource limits, isolated by containers or seccomp.
  • Restrict the host Node.js process with mandatory access controls (AppArmor, SELinux) to deny unexpected file and network access.
  • Validate or reject input scripts that reference SuppressedError or other error-constructor escape primitives until patching completes.
bash
# Update vm2 to a patched release
npm install vm2@^3.11.0
npm ls vm2

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechVm2

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Technical References
  • GitHub Release v3.11.0
  • Vendor Resources
  • GitHub Security Advisory GHSA-55hx-c926-fr95
  • Related CVEs
  • CVE-2026-45411: vm2 Node.js Sandbox RCE Vulnerability

  • CVE-2026-44009: vm2 Node.js Sandbox RCE Vulnerability

  • CVE-2026-44008: vm2 Node.js Sandbox RCE Vulnerability

  • CVE-2026-24118: vm2 Node.js Sandbox Breakout RCE Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English