Wiz Agents & Workflows are here

CVE-2024-34347
JavaScript vulnerability analysis and mitigation

Overview

The @hoppscotch/cli package, a CLI tool for running Hoppscotch Test Scripts in CI environments, contains a sandbox escape vulnerability in versions prior to 0.8.0. The vulnerability exists in the @hoppscotch/js-sandbox package which uses Node.js vm module for JavaScript sandboxing. The issue was discovered on May 8, 2024, and has been assigned CVE-2024-34347 with a CVSS score of 8.3 (HIGH) (GitHub Advisory).

Technical details

The vulnerability stems from the unsafe use of Node.js vm module for sandboxing untrusted JavaScript code. The vm module is known to be unsafe for sandboxing as code inside the vm context can break out if it gains access to any reference to an object created outside of the vm. In @hoppscotch/js-sandbox, multiple references to external objects are passed into the vm context to enable pre-request scripts interactions with environment variables, which inadvertently allows the pre-request script to escape the sandbox (GitHub Advisory).

Impact

An attacker can exploit this vulnerability to execute arbitrary system commands on the victim's machine. The attack vector requires creating a malicious Hoppscotch collection containing a request with a malicious pre-request script and sharing it with a victim. When the victim runs the collection using the Hoppscotch CLI, the malicious pre-request script executes with system-level privileges. This vulnerability does not affect Hoppscotch Web or Desktop versions, as they use a secure web worker sandboxing approach (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 0.8.0 of @hoppscotch/cli. For tools that rely on @hoppscotch/js-sandbox but don't have access to a browser, it is recommended to use alternative safe JavaScript sandboxing libraries such as isolated-vm. The use of vm2 is discouraged as it is deprecated due to arbitrary bypasses. Additionally, users are advised not to run untrusted collections as they can lead to Remote Code Execution (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management