{"containers":{"cna":{"title":"isolated-vm has vulnerable CachedDataOptions in API","problemTypes":[{"descriptions":[{"cweId":"CWE-693","lang":"en","description":"CWE-693: Protection Mechanism Failure","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":9.7,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv","tags":["x_refsource_CONFIRM"],"url":"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv"},{"name":"https://github.com/laverdet/isolated-vm/issues/379","tags":["x_refsource_MISC"],"url":"https://github.com/laverdet/isolated-vm/issues/379"},{"name":"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8","tags":["x_refsource_MISC"],"url":"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8"},{"name":"https://github.com/laverdet/isolated-vm/commits/v4.3.7","tags":["x_refsource_MISC"],"url":"https://github.com/laverdet/isolated-vm/commits/v4.3.7"}],"affected":[{"vendor":"laverdet","product":"isolated-vm","versions":[{"version":"<= 4.3.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-08-24T22:24:52.829Z"},"descriptions":[{"lang":"en","value":"isolated-vm is a library for nodejs which gives the user access to v8's Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user."}],"source":{"advisory":"GHSA-2jjq-x548-rhpv","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:00:43.532Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv"},{"name":"https://github.com/laverdet/isolated-vm/issues/379","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/laverdet/isolated-vm/issues/379"},{"name":"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8"},{"name":"https://github.com/laverdet/isolated-vm/commits/v4.3.7","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/laverdet/isolated-vm/commits/v4.3.7"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T15:48:39.661159Z","id":"CVE-2022-39266","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T16:53:54.194Z"}}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2022-39266","datePublished":"2022-09-29T18:10:08.000Z","dateReserved":"2022-09-02T00:00:00.000Z","dateUpdated":"2025-04-23T16:53:54.194Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}