Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x39w-8vm5-5m3p Sandbox escape via infinite recursion and error objects
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 06 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.
Title Enclave has a sandbox escape via infinite recursion and error objects
Weaknesses CWE-835
References
Metrics cvssV4_0

{'score': 6.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T21:16:57.162Z

Reserved: 2026-02-02T19:59:47.373Z

Link: CVE-2026-25533

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-06T22:16:11.450

Modified: 2026-02-06T22:16:11.450

Link: CVE-2026-25533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses