Intel

AIKIDO-2026-10731

vm2 is vulnerable to Remote Code Execution

Remote Code ExecutionGHSA-9vg3-4rfj-wgcm

98

Critical Risk

This Affects:

JSvm2
0.0.1 - 3.11.1
Fixed in 3.11.2
Are you affected? Scan for Free

TL;DR

Exception handling in the sandbox bridge can treat null-prototype thrown values in a way that leaks host-side inspection surfaces. Guest code can pair that with proxied and unproxied views of the same object to recover dangerous constructors. That breaks the intended isolation boundary and can lead to host code execution. The fix restores safer bridging so bridge.from() paths cannot be abused for host-function unwrapping in this scenario.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

vm2 is vulnerable to Remote Code Execution in versions 0.0.1 - 3.11.1.

How to fix this

Upgrade the vm2 library to the patch version.