| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x39w-8vm5-5m3p | Sandbox escape via infinite recursion and error objects |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:agentfront:enclave:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agentfront
Agentfront enclave |
|
| Vendors & Products |
Agentfront
Agentfront enclave |
Fri, 06 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1. | |
| Title | Enclave has a sandbox escape via infinite recursion and error objects | |
| Weaknesses | CWE-835 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-09T15:27:09.399Z
Reserved: 2026-02-02T19:59:47.373Z
Link: CVE-2026-25533
Updated: 2026-02-09T15:19:20.309Z
Status : Analyzed
Published: 2026-02-06T22:16:11.450
Modified: 2026-02-20T21:06:58.490
Link: CVE-2026-25533
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:50:23Z
Github GHSA