Cyber Posture

CVE-2026-24118

CriticalPublic PoC

Published: 04 May 2026

Published
04 May 2026
Modified
08 May 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system.…

more

This issue has been patched in version 3.11.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of the vm2 sandbox breakout vulnerability in versions prior to 3.11.0 to prevent arbitrary command execution on the host.

prevent

Enforces process isolation to prevent sandbox escape vulnerabilities like CVE-2026-24118 where attackers breakout from vm2 to execute host commands.

prevent

Requires secure isolation and policies for mobile code execution, mitigating risks from vulnerable sandboxes such as vm2 used for untrusted Node.js code.

Security SummaryAI

CVE-2026-24118 is a sandbox breakout vulnerability in vm2, an open-source virtual machine and sandbox library for Node.js. Versions prior to 3.11.0 are affected, enabling attackers to craft code that escapes the VM2 sandbox isolation and executes arbitrary commands on the host system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) and CWE-693 (Protection Mechanism Failure), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Any remote attacker can exploit this vulnerability by supplying malicious code to be executed within a VM2 sandbox instance, requiring no privileges, user interaction, or special conditions due to its network accessibility and low attack complexity. Successful exploitation allows full compromise of the host system, providing high-impact unauthorized access to read, modify, or destroy data (confidentiality, integrity) and disrupt services (availability).

The vulnerability has been patched in vm2 version 3.11.0. Mitigation involves upgrading to this version or later, as detailed in the GitHub security advisories (GHSA-grj5-jjm8-h35p), patch commits (2b5f3e3a060d9088f5e1cdd585d683d491f990a3 and f9b700b1c7d9ef2df416666cb24e0b659140cc74), and release notes for v3.11.0.

Details

CWE(s)

Affected Products

vm2 project
vm2
≤ 3.11.0

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Sandbox escape via code injection (CWE-94) directly enables arbitrary command execution on host via JavaScript (T1059.007) and host compromise/privilege escalation from restricted context (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References