CVE-2026-25533

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass multiple security layers in Enclave, a JavaScript sandbox for AI agent code execution. Attackers can escape the sandbox and execute arbitrary code on the host system by exploiting dynamic property access, error object hardening gaps, and host object reference manipulation. Anyone using Enclave versions before 2.10.1 for AI agent execution is affected.

💻 Affected Systems

Products:
  • Enclave (enclave-vm)
Versions: All versions before 2.10.1
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Enclave for JavaScript sandboxing of AI agent code execution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete sandbox escape leading to arbitrary code execution on the host system, potentially compromising the entire server infrastructure running the Enclave sandbox.

🟠

Likely Case

AI agents executing malicious code that can access host system resources, read sensitive data, or perform unauthorized actions outside the intended sandbox boundaries.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are applied, though sandbox integrity would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploit details are publicly available in the security advisory and research paper. The vulnerability requires attacker-controlled JavaScript code to be executed within the Enclave sandbox.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.1

Vendor Advisory: https://github.com/agentfront/enclave/security/advisories/GHSA-x39w-8vm5-5m3p

Restart Required: Yes

Instructions:

1. Update Enclave to version 2.10.1 or later using npm: npm update enclave-vm@^2.10.1
2. Restart any services or applications using Enclave
3. Verify the update was successful by checking the package version

🔧 Temporary Workarounds

Disable Enclave usage

all

Temporarily disable or remove Enclave from production systems until patching is possible

npm uninstall enclave-vm

Restrict AI agent code execution

all

Limit or disable execution of untrusted JavaScript code within AI agents

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all JavaScript code executed within Enclave
  • Isolate Enclave instances in containerized environments with minimal host access permissions

🔍 How to Verify

Check if Vulnerable:

Check package.json or run: npm list enclave-vm | grep enclave-vm

Check Version:

npm list enclave-vm

Verify Fix Applied:

Verify installed version is 2.10.1 or higher: npm list enclave-vm

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution patterns
  • Attempts to access vm module or Function constructor
  • Error object manipulation attempts

Network Indicators:

  • Outbound connections from Enclave processes to unexpected destinations

SIEM Query:

process.name:"node" AND process.args:"enclave" AND (process.args:"vm" OR process.args:"Function")

🔗 References

📤 Share & Export