<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vm2 (&lt; 3.11.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vm2--3.11.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 09 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vm2--3.11.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>vm2 Sandbox Breakout via Null Proto Exception (CVE-2026-44009)</title><link>https://feed.craftedsignal.io/briefs/2026-05-vm2-sandbox-breakout/</link><pubDate>Sat, 09 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vm2-sandbox-breakout/</guid><description>A sandbox breakout vulnerability exists in vm2 that allows attackers to execute arbitrary commands on the host system by exploiting a null proto exception in `handleException` to obtain proxied and unproxied objects, leading to the retrieval of the host `Function` object and subsequent remote code execution.</description><content:encoded><![CDATA[<p>A critical sandbox breakout vulnerability has been discovered in vm2, a popular Node.js sandbox environment. This flaw, identified as CVE-2026-44009, allows malicious actors to bypass the intended security restrictions and execute arbitrary code on the host system. The vulnerability stems from an error in the <code>handleException</code> function related to exceptions with a null prototype. Attackers can craft specific code within the vm2 sandbox that leverages this error to gain access to the host&rsquo;s <code>Function</code> object, ultimately leading to remote code execution. This vulnerability impacts vm2 versions prior to 3.11.2. Successful exploitation enables attackers to perform unauthorized actions on the underlying system, potentially compromising sensitive data or system integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts malicious JavaScript code designed to exploit the null proto exception within the vm2 sandbox.</li>
<li>The malicious code defines an object with a null prototype (<code>__proto__: null</code>).</li>
<li>The code attempts to throw the null proto object as an exception within the vm2 environment.</li>
<li>The <code>handleException</code> function incorrectly assumes that the exception originates from outside the sandbox due to the null proto.</li>
<li>This leads to the creation of both proxied and unproxied versions of the sandbox object.</li>
<li>The attacker manipulates the proxied and unproxied objects to access the <code>Buffer.prototype.inspect</code> function.</li>
<li>Using the <code>constructor</code> property of the function, the attacker gains access to the host&rsquo;s <code>Function</code> object.</li>
<li>The attacker uses the host <code>Function</code> object to execute arbitrary commands on the host system, such as creating a file named &lsquo;pwned&rsquo;.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-44009) allows an attacker to bypass the vm2 sandbox and execute arbitrary code on the host system. This can lead to complete system compromise, including data theft, malware installation, and denial-of-service attacks. The vulnerability affects any application that relies on vm2 for secure code execution, potentially impacting a wide range of Node.js-based applications and services. The impact is significant due to the ease of exploitation and the potential for complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to vm2 version 3.11.2 or later to patch CVE-2026-44009.</li>
<li>Implement the Sigma rule &ldquo;Detect vm2 Sandbox Breakout Attempt via Null Proto Exception&rdquo; to detect exploitation attempts by monitoring for the specific code patterns used in the proof-of-concept.</li>
<li>Continuously monitor vm2 environments for suspicious activity, including unexpected process creation or file system modifications, which may indicate a successful sandbox escape.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sandbox-escape</category><category>rce</category><category>vm2</category></item></channel></rss>