GHSA-g6w6-h933-4rc5: Soketi was exposed to Sandbox Escape vulnerability via vm2
9.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
8/3/2023
Updated
8/3/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@soketi/soketi | npm | < 1.6.0 | 1.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Soketi's dependency on @pm2/agent, which previously used the deprecated vm2
library. The commit de12bff
shows Soketi upgraded @pm2/agent to v2.0.3 to address this. vm2
's critical sandbox escape (CVE-2023-37466) allowed RCE via Promise
handler exploitation. The primary vulnerable functions are vm2
's VM.run
and NodeVM.run
, which handle sandboxed code execution. These functions were indirectly exposed through PM2's cluster driver integration in Soketi. The confidence is high because the vulnerability is well-documented in vm2
's CVE and the mitigation path (removing vm2
via @pm2/agent update) matches the commit.