Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behavior or the vm module and the function constructor access prevention can be side-stepped by leveraging host object references. This vulnerability is fixed in 2.10.1.
References
| Link | Resource |
|---|---|
| https://github.com/agentfront/enclave/commit/2fcf5da81e7e2578ede6f94cae4f379165426dca | Patch |
| https://github.com/agentfront/enclave/security/advisories/GHSA-x39w-8vm5-5m3p | Exploit Vendor Advisory |
| https://www.staicu.org/publications/usenixSec2023-SandDriller.pdf | Technical Description |
Configurations
History
20 Feb 2026, 21:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/agentfront/enclave/commit/2fcf5da81e7e2578ede6f94cae4f379165426dca - Patch | |
| References | () https://github.com/agentfront/enclave/security/advisories/GHSA-x39w-8vm5-5m3p - Exploit, Vendor Advisory | |
| References | () https://www.staicu.org/publications/usenixSec2023-SandDriller.pdf - Technical Description | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:agentfront:enclave:*:*:*:*:*:*:*:* | |
| First Time |
Agentfront enclave
Agentfront |
|
| Summary |
|
06 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 22:16
Updated : 2026-02-20 21:06
NVD link : CVE-2026-25533
Mitre link : CVE-2026-25533
CVE.ORG link : CVE-2026-25533
JSON object : View
Products Affected
agentfront
- enclave
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
