Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.

Project Subscriptions

Vendors Products
Agentfront Subscribe
Enclave Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x39w-8vm5-5m3p Sandbox escape via infinite recursion and error objects
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:agentfront:enclave:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Agentfront
Agentfront enclave
Vendors & Products Agentfront
Agentfront enclave

Fri, 06 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.
Title Enclave has a sandbox escape via infinite recursion and error objects
Weaknesses CWE-835
References
Metrics cvssV4_0

{'score': 6.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-09T15:27:09.399Z

Reserved: 2026-02-02T19:59:47.373Z

Link: CVE-2026-25533

cve-icon Vulnrichment

Updated: 2026-02-09T15:19:20.309Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T22:16:11.450

Modified: 2026-02-20T21:06:58.490

Link: CVE-2026-25533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-09T10:50:23Z

Weaknesses