CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 1CVE-2025-34267 – Flowise Authenticated Command Execution and Sandbox Bypass via Puppeteer & Playwright Packages
https://notcve.org/view.php?id=CVE-2025-34267
14 Oct 2025 — Flowise v3.0.1 < 3.0.8 and all versions after with 'ALLOW_BUILTIN_DEP' enabled contain an authenticated remote code execution vulnerability and node VM sandbox escape due to insecure use of integrated modules (Puppeteer and Playwright) within the nodevm execution environment. ... When the tool executes, the attacker-controlled executable/parameters are run on the host and circumvent the intended nodevm sandbox restrictions, resulting in execution of arbitrary code in the context ... • https://www.vulncheck.com/advisories/flowise-auth-command-execution-and-sandbox-bypass-via-puppeteer-and-playwright-packages • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0CVE-2025-11152 – Sandbox escape due to integer overflow in the Graphics: Canvas2D component
https://notcve.org/view.php?id=CVE-2025-11152
30 Sep 2025 — This vulnerability affects Firefox < 143.0.3. These are all security issues fixed in the MozillaFirefox-143.0.3-1.1 package on the GA media of openSUSE Tumbleweed. • https://bugzilla.mozilla.org/show_bug.cgi?id=1987246 • CWE-190: Integer Overflow or Wraparound •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2025-59845 – Apollo Embedded Sandbox and Explorer vulnerable to CSRF via window.postMessage origin-validation bypass
https://notcve.org/view.php?id=CVE-2025-59845
26 Sep 2025 — Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. ... This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3. • https://github.com/apollographql/embeddable-explorer/security/advisories/GHSA-w87v-7w53-wwxv • CWE-346: Origin Validation Error CWE-352: Cross-Site Request Forgery (CSRF) •
CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0CVE-2025-59532 – Codex has sandbox bypass due to bug in path configuration logic
https://notcve.org/view.php?id=CVE-2025-59532
22 Sep 2025 — In versions 0.2.0 to 0.38.0, due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated cwd as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandbox restriction. This issue has been patched in Codex CLI 0.39.0 t... • https://github.com/openai/codex/commit/8595237505a1e0faabc2af3db805b66ce3ae182d • CWE-20: Improper Input Validation •
CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0CVE-2025-59340 – jinjava Sandbox Bypass via JavaType-Based Deserialization
https://notcve.org/view.php?id=CVE-2025-59340
17 Sep 2025 — As a result, an attacker can escape the sandbox and instantiate classes such as java.net.URL, opening up the ability to access local files and URLs(e.g., file:///etc/passwd). • https://github.com/HubSpot/jinjava/commit/66df351e7e8ad71ca04dcacb4b65782af820b8b1 • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •
CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0CVE-2025-10528 – firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component
https://notcve.org/view.php?id=CVE-2025-10528
16 Sep 2025 — The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to undefined behavior, invalid pointer in the Graphics. • https://bugzilla.mozilla.org/show_bug.cgi?id=1986185 • CWE-693: Protection Mechanism Failure CWE-824: Access of Uninitialized Pointer •
CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0CVE-2025-10527 – firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component
https://notcve.org/view.php?id=CVE-2025-10527
16 Sep 2025 — The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to use-after-free in the Graphics. • https://bugzilla.mozilla.org/show_bug.cgi?id=1984825 • CWE-416: Use After Free •
CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0CVE-2025-43332
https://notcve.org/view.php?id=CVE-2025-43332
15 Sep 2025 — A file quarantine bypass was addressed with additional checks. ... An app may be able to break out of its sandbox. • https://support.apple.com/en-us/125110 • CWE-284: Improper Access Control •
CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0CVE-2025-43358
https://notcve.org/view.php?id=CVE-2025-43358
15 Sep 2025 — A permissions issue was addressed with additional sandbox restrictions. ... A shortcut may be able to bypass sandbox restrictions. • https://support.apple.com/en-us/125108 • CWE-862: Missing Authorization •
CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0CVE-2025-48543 – Android Runtime Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2025-48543
04 Sep 2025 — In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. ... Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation. • https://android.googlesource.com/platform/art/+/444fc40dfb04d2ec5f74c443ed3a4dd45d3131f2 • CWE-416: Use After Free •
