vm2 is vulnerable to Improper Control of Generation of Code ('Code Injection')
98
Critical Risk
Affected versions of this package allow sandbox escape due to multiple isolation bypasses involving Promise static method stealing, Reflect.construct species manipulation, and sensitive object exposure via util.inspect. These flaws break execution boundaries and may expose internal references or privileged contexts. An attacker could exploit this by executing crafted code inside the sandbox that manipulates Promise behavior, abuses proxy handlers, or leverages inspection mechanisms to access objects outside the restricted environment, ultimately achieving arbitrary code execution or privilege escalation.
You are affected if you are using a version that falls within the vulnerable range.
vm2 is vulnerable to Improper Control of Generation of Code ('Code Injection') in versions 3.9.6 - 3.10.3.
Upgrade the vm2 library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant