Protection Mechanism Failure Affecting enclave-vm package, versions <2.7.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-ENCLAVEVM-14927487
  • published14 Jan 2026
  • disclosed13 Jan 2026
  • creditUnknown

Introduced: 13 Jan 2026

CVE-2026-22686  (opens in a new tab)
CWE-693  (opens in a new tab)

How to fix?

Upgrade enclave-vm to version 2.7.0 or higher.

Overview

enclave-vm is a Sandbox runtime for secure JavaScript code execution

Affected versions of this package are vulnerable to Protection Mechanism Failure via the exposure of a host-side Error object to sandboxed code, which retains its host realm prototype chain. An attacker can intentionally trigger a host error and traverse the prototype chain to access the host Function constructor, enabling execution of arbitrary JavaScript in the host context and access to sensitive resources such as environment variables, filesystem, and network.

References

CVSS Base Scores

version 4.0
version 3.1