<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Luajit — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/luajit/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 01:16:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/luajit/feed.xml" rel="self" type="application/rss+xml"/><item><title>Luanti LuaJIT Sandbox Escape (CVE-2026-40959)</title><link>https://feed.craftedsignal.io/briefs/2026-04-luanti-sandbox-escape/</link><pubDate>Thu, 16 Apr 2026 01:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-luanti-sandbox-escape/</guid><description>Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-40959 describes a critical vulnerability in Luanti 5, specifically in versions prior to 5.15.2, when used with LuaJIT. The vulnerability allows a malicious actor to escape the Lua sandbox environment by exploiting a crafted &ldquo;mod.&rdquo; This escape could lead to unauthorized access and control over the system, potentially allowing for arbitrary code execution outside of the intended sandbox. The vulnerability was reported to MITRE and assigned a CVSS v3.1 score of 9.3, indicating a critical severity. This vulnerability poses a significant threat to systems relying on Luanti for sandboxed Lua execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Lua &ldquo;mod&rdquo; specifically designed to exploit the sandbox escape vulnerability in Luanti.</li>
<li>The malicious mod leverages weaknesses in the LuaJIT implementation within Luanti to bypass sandbox restrictions.</li>
<li>The crafted mod is loaded into a vulnerable Luanti 5 instance.</li>
<li>Upon execution of the malicious mod, the attacker gains the ability to execute arbitrary Lua code outside the intended sandbox.</li>
<li>The attacker can then utilize this escaped context to interact with the underlying operating system.</li>
<li>Using OS-level access, the attacker escalates privileges further.</li>
<li>The attacker installs persistent backdoors or other malicious software.</li>
<li>Finally, the attacker achieves complete system compromise, exfiltrates sensitive data, or causes other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40959 could lead to a complete compromise of systems utilizing vulnerable versions of Luanti 5 with LuaJIT. An attacker could gain unauthorized access to sensitive data, install malware, or disrupt critical services. Given the critical CVSS score of 9.3, the potential impact is high, especially in environments where Luanti is used to sandbox untrusted Lua code. The number of potential victims depends on the adoption rate of Luanti 5 and the prevalence of LuaJIT usage within those installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Luanti to version 5.15.2 or later to patch CVE-2026-40959.</li>
<li>Monitor for the loading of unsigned or untrusted Lua mods within Luanti environments (see process_creation rule below).</li>
<li>Inspect Lua mods for suspicious code patterns indicative of sandbox escape attempts (develop custom rules based on the specific LuaJIT weaknesses exploited).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sandbox-escape</category><category>luanti</category><category>luajit</category><category>cve-2026-40959</category></item></channel></rss>