<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Nyariv — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/nyariv/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 19:42:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/nyariv/feed.xml" rel="self" type="application/rss+xml"/><item><title>SandboxJS Function.caller Sandbox Escape Vulnerability (CVE-2026-43898)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sandboxjs-escape/</link><pubDate>Mon, 11 May 2026 19:42:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sandboxjs-escape/</guid><description>SandboxJS is vulnerable to a sandbox escape (CVE-2026-43898); by exploiting the `Function.caller` property, sandboxed code can access the internal `LispType.Call` runtime callback, which allows an attacker to manipulate the context and arguments of the callback, leading to the execution of arbitrary host JavaScript and a complete sandbox escape.</description><content:encoded><![CDATA[<p>SandboxJS is a JavaScript sandbox environment that allows the execution of untrusted code in a controlled manner. A critical vulnerability, CVE-2026-43898, exists in versions 0.9.5 and earlier. This vulnerability allows a malicious actor to escape the sandbox and execute arbitrary JavaScript code on the host system. The vulnerability stems from the exposure of the <code>Function.caller</code> property within the sandbox. By exploiting this property, sandboxed code can gain access to the internal <code>LispType.Call</code> runtime callback, enabling manipulation of the callback&rsquo;s context and arguments to execute arbitrary commands. This vulnerability poses a significant risk, potentially leading to remote code execution (RCE) on systems utilizing the vulnerable SandboxJS package.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker injects malicious JavaScript code into the SandboxJS environment.</li>
<li>The injected code uses <code>Function.caller</code> to obtain a reference to the internal <code>LispType.Call</code> runtime callback.</li>
<li>The attacker crafts a fake <code>context</code> and <code>obj</code> to pass as arguments to the leaked callback.</li>
<li>The crafted context includes a <code>capture</code> function that intercepts the internal function call within SandboxJS.</li>
<li>The attacker uses the captured function to leak static properties of the <code>Object</code> constructor.</li>
<li>The attacker obtains a reference to the host <code>Function</code> constructor by calling internal primitive functions.</li>
<li>The attacker crafts a string containing JavaScript code to execute on the host system.</li>
<li>The attacker invokes the host <code>Function</code> constructor with the malicious JavaScript code, resulting in remote code execution on the host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-43898) allows an attacker to bypass the SandboxJS sandbox and execute arbitrary JavaScript code on the host system. This can lead to complete system compromise, including data theft, malware installation, and denial-of-service. Given the nature of sandboxes being used to execute untrusted code, the impact is typically critical. The vulnerability affects all users of <code>@nyariv/sandboxjs</code> versions 0.9.5 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>@nyariv/sandboxjs</code> package to a version greater than 0.9.5 to patch CVE-2026-43898.</li>
<li>Deploy the Sigma rule &ldquo;Detect SandboxJS Function Caller Abuse&rdquo; to detect attempts to exploit the <code>Function.caller</code> vulnerability.</li>
<li>Monitor JavaScript execution within SandboxJS environments for unexpected calls to <code>Function.caller</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sandbox-escape</category><category>rce</category><category>javascript</category></item></channel></rss>