WhisperX tag archive

#Sandbox Escape

This page collects WhisperX intelligence signals tagged #Sandbox Escape. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-07 04:27:15 · GitHub Issues

1. Jinja2 Sandbox Escape Flaw (CVE-2025-27516) Exposes Apps to Arbitrary Code Execution

A critical sandbox escape vulnerability in the widely-used Jinja2 templating engine allows attackers to execute arbitrary Python code. The flaw, tracked as CVE-2025-27516, stems from an oversight in how the sandboxed environment interacts with the `|attr` filter. This bypass enables a threat actor who controls template...

The Lab · 2026-05-03 13:54:09 · GitHub Issues

2. CVSS 10 Sandbox Escape via Path Traversal in Docker and Singularity Container Environments

A critical path traversal vulnerability affecting Docker and Singularity persistent environments has been identified and patched. The flaw, rated CVSS 10, allows an attacker-controlled `task_id` parameter to redirect sandbox directory bind mounts outside the intended containment boundary, exposing the host filesystem t...

The Lab · 2026-05-10 15:01:39 · GitHub Issues

3. Superset Security Audit Patches Critical vm2 Sandbox Escape and Axios SSRF Flaws; One Vulnerability Remains Unfixed

A comprehensive security audit of Apache Superset has uncovered multiple critical and high-severity vulnerabilities across the codebase, prompting immediate remediation of two dangerous flaws while leaving one critical issue without an available fix. The audit, documented in a newly added SECURITY_AUDIT.md file, scanne...