The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-44005

CVE-2026-44005: Vm2 Sandbox RCE Vulnerability

CVE-2026-44005 is a remote code execution vulnerability in Vm2 sandbox for Node.js. Attackers can mutate host prototypes through exposed mutable proxies. This article covers technical details, affected versions, and mitigation.

Published: May 17, 2026

CVE-2026-44005 Overview

CVE-2026-44005 is a sandbox escape vulnerability in vm2, an open-source virtual machine and sandbox library for Node.js. Versions 3.9.6 through 3.10.5 expose mutable proxies for host-realm intrinsic prototypes through the bridge between sandbox and host. Attacker-controlled JavaScript executing inside a default VM or inherited NodeVM can mutate shared host objects including Object.prototype, Array.prototype, and Function.prototype. The flaw is classified under CWE-94: Improper Control of Generation of Code. Maintainers addressed the issue in vm2 version 3.11.0.

Critical Impact

Attackers can break out of the vm2 sandbox and corrupt host-realm prototypes, leading to integrity loss and arbitrary code execution in the parent Node.js process.

Affected Products

  • vm2 versions 3.9.6 through 3.10.5
  • Node.js applications embedding vulnerable vm2 releases
  • Downstream packages that depend transitively on vulnerable vm2 versions

Discovery Timeline

  • 2026-05-13 - CVE-2026-44005 published to NVD
  • 2026-05-14 - Last updated in NVD database

Technical Details for CVE-2026-44005

Vulnerability Analysis

The vm2 library establishes a bridge that mediates object access between the sandboxed guest realm and the host Node.js realm. For host-realm intrinsic prototypes such as Object.prototype, Array.prototype, and Function.prototype, the bridge exposes proxies that remain mutable from inside the sandbox. When sandbox code writes to these proxies, the bridge forwards those operations to the underlying host objects through otherReflectSet() and otherReflectDefineProperty(). The result is that guest code can directly mutate intrinsics shared by the host process.

Prototype pollution against host intrinsics breaks the isolation contract that vm2 is designed to provide. Once host prototypes are tampered with, any subsequent code running in the host realm inherits the attacker-controlled properties, enabling code execution, logic manipulation, and denial of service against the parent application.

Root Cause

The root cause is that the bridge treats host-realm intrinsic prototypes as writable from the sandbox side. Rather than freezing or interposing read-only proxies, vm2 passes write and define-property operations directly to host objects via otherReflectSet() and otherReflectDefineProperty(). This forwarding behavior violates the isolation boundary between guest and host realms.

Attack Vector

An attacker supplies untrusted JavaScript that the application evaluates inside a vm2VM or NodeVM instance. The attacker accesses a host-intrinsic proxy reachable from the sandbox, then assigns or defines properties on it. The bridge propagates the mutation to the real host Object.prototype, Array.prototype, or Function.prototype. Subsequent host-realm code that reads those polluted properties executes attacker-controlled behavior, completing the sandbox escape.

The vulnerability mechanism is documented in the vm2 GitHub Security Advisory GHSA-vwrp-x96c-mhwq. No public proof-of-concept exploit is referenced in the advisory at the time of publication.

Detection Methods for CVE-2026-44005

Indicators of Compromise

  • Unexpected properties appearing on host Object.prototype, Array.prototype, or Function.prototype after sandbox execution
  • Node.js processes hosting vm2 exhibiting anomalous child process spawns or outbound network connections
  • Application log entries showing untrusted scripts referencing __proto__, constructor.prototype, or Reflect.defineProperty during sandbox runs

Detection Strategies

  • Inventory all production dependencies and flag any package resolving to vm2 between 3.9.6 and 3.10.5 using npm ls vm2 or software composition analysis tooling.
  • Add runtime assertions in the host process that snapshot critical intrinsic prototypes and compare them after each sandbox invocation.
  • Review build manifests and lockfiles in CI to fail builds that pull vulnerable vm2 versions transitively.

Monitoring Recommendations

  • Forward Node.js process telemetry, including child process and file system events, to a centralized analytics platform for behavioral baselining.
  • Alert on vm2-hosting services that initiate new outbound connections or spawn shells not observed in baseline behavior.
  • Track CVE feeds and the vm2 advisory page for updates referencing GHSA-vwrp-x96c-mhwq.

How to Mitigate CVE-2026-44005

Immediate Actions Required

  • Upgrade vm2 to version 3.11.0 or later across all applications and container images.
  • Audit dependency trees with npm audit and npm ls vm2 to surface transitive uses of vulnerable releases.
  • Restrict the categories of untrusted code accepted by services that rely on vm2 until patching completes.
  • Note that the vm2 project has been deprecated by its maintainers; plan migration to an actively maintained isolation library such as isolated-vm or out-of-process sandboxing.

Patch Information

The vulnerability is fixed in vm2 version 3.11.0. Refer to the GitHub Security Advisory GHSA-vwrp-x96c-mhwq for the official remediation guidance from the patriksimek/vm2 project.

Workarounds

  • Execute untrusted code in an isolated operating system process or container with seccomp and minimal privileges instead of relying on in-process vm2 isolation.
  • Freeze host-realm intrinsics with Object.freeze(Object.prototype), Object.freeze(Array.prototype), and Object.freeze(Function.prototype) at application startup, accepting compatibility tradeoffs.
  • Reject or statically validate guest scripts to block access to __proto__, constructor, and Reflect constructs prior to evaluation.
bash
# Configuration example
npm install vm2@^3.11.0
npm ls vm2
npm audit --production

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechVm2

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-43999: Vm2_project Vm2 RCE Vulnerability

  • CVE-2026-43997: Vm2_project Vm2 RCE Vulnerability

  • CVE-2026-43998: Vm2_project Vm2 RCE Vulnerability

  • CVE-2026-44000: Vm2 Sandbox Escape RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English