LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-44005

CVE-2026-44005 - Vulnerability Analysis

CriticalCVSS: 10.0

Last Updated: May 14, 2026

vm2 - Prototype Pollution

Published: May 13, 2026Updated: May 14, 2026PoC AvailableRemote Exploitable

Overview

vm2 3.9.6 to 3.10.5 contains a prototype pollution caused by exposing mutable proxies for host-realm intrinsic prototypes in the bridge, letting attacker-controlled JavaScript mutate shared Object, Array, and Function prototypes, exploit requires attacker-controlled code execution inside the sandbox.

Severity & Score

Severity: Critical
CVSS Score: 10.0
EPSS Score: 4.5%(Probability of exploitation in next 30 days)

Impact

Attackers can modify shared host prototypes, leading to arbitrary code execution or sandbox escape.

Mitigation

Update to version 3.11.0 or later.

Social Media Activity(3 posts)

Info Sec Bot
Info Sec Bot
@infosecbot
May 14, 2026

[1/5] Executive Summary – Key Threat‑Intelligence Highlights (13 May – 14 May 2026) Below is a concise, prioritized briefing of the most impactful security events that are directly relevant to our IoT‑focused subsidiary (Linux/Ubuntu workstations, Azure Container Apps, Kubernetes, and the typical development toolchain). Each bullet includes a full‑length source link as required. --- 1. Critical Vulnerabilities that Touch Our Stack : VM2 sandbox‑escape (CVE‑2026‑44005) – Remote code execution in the popular Node.js sandbox library used by many npm packages. • Our container images (Wolfi, Alpine, Debian, Ubuntu) often run Node‑based build tools and CI/CD scripts; a compromised VM2 could break isolation and lead to host compromise. • https://cveawg.mitre.org/api/cve/CVE-2026-44005 WebdriverIO CI/CD command‑injection (CVE‑2026‑25244) – Malicious Git branch names can trigger code execution on CI runners. • Directly affects our Azure Pipelines / GitHub Actions workflows that use WebdriverIO for UI testing. • https://mastodon.social/@netsecio/116567593278695651 Firefox high‑severity bugs discovered by Anthropic’s Mythos AI (CVE‑2026‑33824, CVE‑2026‑33827) – Remote‑code‑execution paths in the browser. • Developers and QA staff use Firefox on Ubuntu workstations; a compromised browser can be a foothold for credential theft. • https://www.cyberhub.blog/article/25855-anthropics-mythos-ai-discovers-multiple-high-severity-vulnerabilities-in-firefox Windows BitLocker zero‑day (public PoC) – Bypass of drive encryption on Windows 11. • Some engineering laptops still run Windows 11 with BitLocker; the flaw could expose source code or design data. • https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/ Microsoft Patch Tuesday (May 2026) – 120 CVEs fixed, 29 are critical RCE bugs affecting Windows, Azure services, and core libraries. • Our Azure Container Apps and any Windows‑based build agents must be patched immediately to stay protected. • https://securebulletin.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/ #infosecnews

View original post
TheHackerWire
TheHackerWire
@thehackerwire
May 13, 2026

🔴 CVE-2026-44005 - Critical (10) vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44005/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
TheHackerWire
TheHackerWire
@thehackerwire
May 13, 2026

🔴 CVE-2026-44005 - Critical (10) vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44005/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-44005
Severity
Critical
CVSS Score
10.0
Type
prototype_pollution
Status
modified
EPSS
4.5%
Social Posts
3

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H

EPSS Score

4.5%Probability of exploitation in the next 30 days