CVSS: -EPSS: %CPEs: 1EXPL: 0CVE-2026-3545
https://notcve.org/view.php?id=CVE-2026-3545
04 Mar 2026 — Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html •
CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 1CVE-2026-27952 – Agenta has Python Sandbox Escape, Leading to Remote Code Execution (RCE)
https://notcve.org/view.php?id=CVE-2026-27952
26 Feb 2026 — In Agenta-API prior to version 0.48.1, a Python sandbox escape vulnerability existed in Agenta's custom code evaluator. • https://github.com/Agenta-AI/agenta/security/advisories/GHSA-pmgp-2m3v-34mq • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0CVE-2026-27976 – Zed Extension Sandbox Escape via Tar Symlink Following
https://notcve.org/view.php?id=CVE-2026-27976
25 Feb 2026 — Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) creates symlinks from the archive without validation, and the path guard (`writeable_path_from_extension`) only performs lexical prefix checks without resolving symlinks. An attacker can ship a tar that first creates a symlink inside the extension workdir pointing outside (e.g., `escape -> /`), then writes files through the symlink, causing writes to arbitrary ... • https://github.com/zed-industries/zed/security/advisories/GHSA-59p4-3mhm-qm3r • CWE-61: UNIX Symbolic Link (Symlink) Following •
CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 0CVE-2026-27577 – n8n: Expression Sandbox Escape Leads to RCE
https://notcve.org/view.php?id=CVE-2026-27577
25 Feb 2026 — n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of ... • https://docs.n8n.io/hosting/securing/overview • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 0CVE-2026-27495 – n8n has a Sandbox Escape in its JavaScript Task Runner
https://notcve.org/view.php?id=CVE-2026-27495
25 Feb 2026 — n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could exploit a vulnerability in the JavaScript Task Runner sandbox to execute arbitrary code outside the sandbox boundary. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task execut... • https://docs.n8n.io/hosting/configuration/task-runners • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0CVE-2026-27494 – n8n has Arbitrary File Read via Python Code Node Sandbox Escape
https://notcve.org/view.php?id=CVE-2026-27494
25 Feb 2026 — n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node to escape the sandbox. The sandbox did not sufficiently restrict access to certain built-in Python objects, allowing an attacker to exfiltrate file contents or achieve RCE. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using exte... • https://github.com/n8n-io/n8n/releases/tag/n8n@1.123.22 • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •
CVSS: 9.5EPSS: 0%CPEs: 3EXPL: 0CVE-2026-27493 – n8n has Unauthenticated Expression Evaluation via Form Node
https://notcve.org/view.php?id=CVE-2026-27493
25 Feb 2026 — When chained with an expression sandbox escape, this could escalate to remote code execution on the n8n host. ... Escalation to remote code execution requires chaining with a separate sandbox escape vulnerability. • https://github.com/n8n-io/n8n/commit/562d867483e871b0f1e31776252e23bd721df75b • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •
CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0CVE-2026-27597 – @enclave-vm/core is vulnerable to Sandbox Escape
https://notcve.org/view.php?id=CVE-2026-27597
25 Feb 2026 — Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be used to achieve remote code execution (RCE). The issue has been fixed in version 2.11.1. • https://github.com/agentfront/enclave/commit/09afbebe4cb6d0586c1145aa71ffabd2103932db • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0CVE-2026-2778 – Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component
https://notcve.org/view.php?id=CVE-2026-2778
24 Feb 2026 — Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. • https://bugzilla.mozilla.org/show_bug.cgi?id=2016358 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0CVE-2026-2776 – Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
https://notcve.org/view.php?id=CVE-2026-2776
24 Feb 2026 — Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. • https://bugzilla.mozilla.org/show_bug.cgi?id=2015266 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
