All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.
Exploiting this vulnerability might result in remote code execution ("RCE").
**Vulnerable functions:**
__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
References
Configurations
History
No history.
Information
Published : 2023-04-11 05:15
Updated : 2025-02-07 17:15
NVD link : CVE-2023-26122
Mitre link : CVE-2023-26122
CVE.ORG link : CVE-2023-26122
JSON object : View
Products Affected
safe-eval_project
- safe-eval