CVE-2025-53372
JavaScript vulnerability analysis and mitigation

Overview

node-code-sandbox-mcp is a Node.js-based Model Context Protocol server that spins up disposable Docker containers to execute arbitrary JavaScript. A command injection vulnerability (CVE-2025-53372) was discovered in versions prior to 1.3.0. The vulnerability stems from unsanitized use of input parameters within child_process.execSync calls, which enables attackers to inject arbitrary system commands (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the MCP Server's tooling where user input is directly concatenated into command strings executed via child_process.execSync. This allows injection of shell metacharacters (|, >, &&, etc.) enabling command execution outside the intended Docker container context. The vulnerability has been assigned a CVSS v3.1 score of 7.5 (High) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating network accessibility with high attack complexity, no privileges required, and user interaction needed (GitHub Advisory).

Impact

Successful exploitation can lead to remote code execution under the server process's privileges on the host machine, effectively bypassing the sandbox protection of running code inside Docker containers. This allows attackers to execute arbitrary commands on the host system, potentially compromising the entire server (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.3.0 by replacing childprocess.execSync with the safer childprocess.execFileSync API, which accepts arguments as a separate array and prevents shell interpretation. Users should upgrade to version 1.3.0 or later to receive the security fix (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-vffh-c9pq-4crhMEDIUM6.5
  • JavaScriptJavaScript
  • uptime-kuma
NoNoOct 20, 2025
CVE-2025-62522MEDIUM6
  • JavaScriptJavaScript
  • vite
NoYesOct 20, 2025
CVE-2025-62595MEDIUM4.3
  • JavaScriptJavaScript
  • koa
NoYesOct 21, 2025
GHSA-xvp7-8vm8-xfxxMEDIUM4.2
  • JavaScriptJavaScript
  • @actual-app/sync-server
NoNoOct 20, 2025
CVE-2025-62505LOW3
  • JavaScriptJavaScript
  • @lobehub/chat
NoYesOct 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management