vm2 is vulnerable to Remote Code Execution (RCE)
91
Critical Risk
With nesting: true, the resolver path merges a nesting override that always exposes the vm2 builtin into the sandbox module graph even when the host chose require: false to deny every module. Sandbox code can therefore require('vm2'), construct a fresh inner NodeVM with its own require policy including host builtins such as child_process, and run operating-system commands outside the intended isolation. The patch rejects the contradictory option pair at construction time with a clear VMError so embedders cannot silently build a host-equivalent environment while believing require is fully disabled.
You are affected if you are using a version that falls within the vulnerable range and your application runs untrusted or user-supplied code inside a NodeVM with nesting: true.
vm2 is vulnerable to Remote Code Execution (RCE) in versions 0.0.1 - 3.11.0.
Upgrade the vm2 library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant