Intel

AIKIDO-2026-10190

vm2 is vulnerable to Improper Control of Generation of Code ('Code Injection')

Improper Control of Generation of Code ('Code Injection')CVE-2026-22709

98

Critical Risk

This Affects:

JSvm2
3.9.6 - 3.10.3
Fixed in 3.10.4

TL;DR

Affected versions of this package allow sandbox escape due to multiple isolation bypasses involving Promise static method stealing, Reflect.construct species manipulation, and sensitive object exposure via util.inspect. These flaws break execution boundaries and may expose internal references or privileged contexts. An attacker could exploit this by executing crafted code inside the sandbox that manipulates Promise behavior, abuses proxy handlers, or leverages inspection mechanisms to access objects outside the restricted environment, ultimately achieving arbitrary code execution or privilege escalation.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

vm2 is vulnerable to Improper Control of Generation of Code ('Code Injection') in versions 3.9.6 - 3.10.3.

How to fix this

Upgrade the vm2 library to the patch version.

Background Info