EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the vm2 library, affecting versions up to and including 3.11.3. The identified vulnerabilities are related to Remote Code Execution (RCE) and compromise the core security promise of the vm2 library. These flaws can be exploited by unauthenticated code running inside the sandbox to achieve RCE on the host server process, posing an extreme risk to legacy versions active in production. Business risk and impact are severe, as untrusted scripts can interact directly with host-side execution primitives, compromising server secrets, local files, and system processes.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the vm2 library, affecting versions up to and including 3.11.3. The identified vulnerabilities are related to Remote Code Execution (RCE) and compromise the core security promise of the vm2 library. These flaws can be exploited by unauthenticated code running inside the sandbox to achieve RCE on the host server process, posing an extreme risk to legacy versions active in production. Business risk and impact are severe, as untrusted scripts can interact directly with host-side execution primitives, compromising server secrets, local files, and system processes.[emaillocker id="1283"]
The identified vulnerabilities pose a significant risk to business operations, as they can be exploited by unauthenticated code running inside the sandbox to achieve RCE on the host server process. If left unpatched, these vulnerabilities can result in a complete compromise of server secrets, local files, and system processes.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://securityonline.info/vm2-sandbox-escape-vulnerabilities-cve-2026-47140-node-rce/