Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability

    April 26, 2026

    ProjectSend CVE-2024-11680 Exploited in the Wild | Blog

    April 26, 2026

    IBM security advisory (AV26-365) – Canadian Centre for Cyber Security

    April 26, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»VU#414811: Terrarium contains a vulnerability that allows arbitrary code execution
    Alerts

    VU#414811: Terrarium contains a vulnerability that allows arbitrary code execution

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Overview

    Terrarium is a sandbox-based code execution platform that enables users to run and execute code in a controlled environment, providing a secure way to test and validate code. However, a vulnerability has been discovered in Terrarium that allows arbitrary code execution with root privileges on the host Node.js process. This vulnerability is caused by a JavaScript prototype chain traversal in the Pyodide WebAssembly environment.

    Description

    The root cause of the vulnerability lies in the configuration of jsglobals objects in service.ts. Specifically, the mock document object is created using a standard JavaScript object literal, which inherits properties from Object.prototype. This inheritance chain allows sandbox code to traverse up to the function constructor, create a function that returns globalThis, and from there access Node.js internals, including require(). As a result, an attacker can escape the sandbox and execute arbitrary system commands as root within the container.

    CVE-2026-5752
    Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.

    Impact

    Applications that use Terrarium for sandboxed code execution may be compromised, allowing an attacker to:

    • Execute arbitrary commands as root inside the container
    • Access and modify sensitive files, including /etc/passwd and environment variables
    • Reach other services on the container’s network, including databases and internal APIs
    • Potentially escape the container and escalate privileges further

    Mitigation

    Unfortunately, we were unable to coordinate with the vendor to obtain a patch or fix for this vulnerability. In the meantime, several mitigation strategies can be employed to reduce the risk of exploitation. Users should consider implementing the following measures:

    • Disable unnecessary features: Disable any features that allow users to submit code to the sandbox, if possible.
    • Implement network segmentation: Segment the network to limit the attack surface and prevent lateral movement.
    • Use a Web Application Firewall (WAF): Deploy a WAF to detect and block suspicious traffic, including attempts to exploit the vulnerability.
    • Monitor container activity: Regularly monitor container activity for signs of suspicious behavior.
    • Implement access controls: Limit access to the container and its resources to authorized personnel only.
    • Use a secure container orchestration tool: Utilize a secure container orchestration tool to manage and secure containers.
    • Regularly update and patch dependencies: Ensure that dependencies are up-to-date and patched.

    Acknowledgments

    The vulnerability was discovered by Jeremy Brown, who used AI-assisted vulnerability research to identify the issue. This document was written by Timur Snoke with assistance from AI.

    Vendor Information

    One or more vendors are listed for this advisory. Please reference the full report for more information.

    References

    • https://github.com/cohere-ai/cohere-terrarium

    Other Information

    CVE IDs:

    CVE-2026-5752

    Date Public: 2026-04-21
    Date First Published: 2026-04-21
    Date Last Updated: 2026-04-21 13:37 UTC
    Document Revision: 1

    • About vulnerability notes
    • Contact us about this vulnerability
    • Provide a vendor statement



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRansomware Targets CyberAlberta Community of Interest Member
    Next Article Hardy Barth Salia EV Charge Controller
    admin
    • Website

    Related Posts

    Alerts

    ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability

    April 26, 2026
    Alerts

    IBM security advisory (AV26-365) – Canadian Centre for Cyber Security

    April 26, 2026
    Alerts

    ZDI-26-258: (0Day) Docker Desktop extension-manager Exposed Dangerous Function Local Privilege Escalation Vulnerability

    April 26, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202662 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    ZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability

    April 26, 2026

    ProjectSend CVE-2024-11680 Exploited in the Wild | Blog

    April 26, 2026

    IBM security advisory (AV26-365) – Canadian Centre for Cyber Security

    April 26, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.