CVE-2026-25049 highlights weaknesses in sandboxing user-defined JavaScript expressions within n8n workflows.

Multiple research teams demonstrated authenticated sandbox escape leading to unrestricted RCE, credential exposure, filesystem access, cloud pivoting, and AI workflow manipulation. The issue stems from incomplete AST-based sandboxing and runtime enforcement gaps.

Fixes have been released, and mitigation guidance includes updating, rotating secrets, and restricting workflow permissions.

Source: https://www.bleepingcomputer.com/news/security/critical-n8n-flaws-disclosed-along-with-public-exploits/

💬 What lessons does this case offer for securing automation platforms?

➕ Follow TechNadu for accurate, vendor-neutral infosec reporting.

#Infosec #CVE #n8n #SandboxEscape #RCE #CloudSecurity #DevSecOps

Trust Me, I’m Local: Chrome Extensions, MCP, and the Sandbox Escape

Let’s talk about MCPs. You’ve probably heard of them, and maybe you’ve read the security risks associated with them. Sure, they sound worrying, but when you put them into a real-world context, they…

ExtensionTotal
Mozilla Alerts Windows Users to Critical Firefox Sandbox Escape Vulnerability

Mozilla warns of a critical Firefox vulnerability allowing sandbox escapes, posing significant security risks to Windows users.

The DefendOps Diaries
VMware Sicherheitsupdate: Aktualisierungen schützen Workstation, Fusion und ESXi vor aktiven Angriffen

Jetzt einspielen: Aktuelle Patches schließen Sicherheitslücken und bewahren schlimmstenfalls vor einem Sandbox-Escape.

TARNKAPPE.INFO

🚨​ [#PatchNow] New VM2 #SandboxEscape... Two critical vulns are out in the #VM2 #Sandbox Library. These flaws affect all versions prior to 3.9.17 and both carry a CVSS score of 9.8.

If exploited, a threat actor could escape protection boundaries and execute arbitrary code. A patch has been released. so get it and update: https://www.bleepingcomputer.com/news/security/new-sandbox-escape-poc-exploit-available-for-vm2-library-patch-now.

These two CVEs (CVE-2023-29199 and CVE-2023-30547) were discovered by Seung Hyun Lee.

https://nvd.nist.gov/vuln/detail/CVE-2023-29199

https://nvd.nist.gov/vuln/detail/CVE-2023-30547

#infosec #patchmanagement #riskmitigation

New sandbox escape PoC exploit available for VM2 library, patch now

Security researchers have released yet another sandbox escape proof of concept (PoC) exploit that makes it possible to execute unsafe code on the host running the VM2 sandbox.

BleepingComputer
Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape - Google Project Zero disclosed the bug before a patch becomes available from Microsoft. https://threatpost.com/unpatched-windows-zero-day-exploited-sandbox-escape/160828/ #localprivilegeescalation #securityvulnerability #googleprojectzero #vulnerabilities #7-daydisclosure #bufferoverflow #cve-2020-17087 #proofofconcept #sandboxescape #inthewild #windows10 #zero-day #exploit #windows #kernel #crash #ioctl #bug
Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape

Google Project Zero disclosed the bug before a patch becomes available from Microsoft.

Threatpost - English - Global - threatpost.com