CVE-2025-53372
JavaScript vulnerability analysis and mitigation

Overview

node-code-sandbox-mcp is a Node.js-based Model Context Protocol server that spins up disposable Docker containers to execute arbitrary JavaScript. A command injection vulnerability (CVE-2025-53372) was discovered in versions prior to 1.3.0. The vulnerability stems from unsanitized use of input parameters within child_process.execSync calls, which enables attackers to inject arbitrary system commands (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the MCP Server's tooling where user input is directly concatenated into command strings executed via child_process.execSync. This allows injection of shell metacharacters (|, >, &&, etc.) enabling command execution outside the intended Docker container context. The vulnerability has been assigned a CVSS v3.1 score of 7.5 (High) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating network accessibility with high attack complexity, no privileges required, and user interaction needed (GitHub Advisory).

Impact

Successful exploitation can lead to remote code execution under the server process's privileges on the host machine, effectively bypassing the sandbox protection of running code inside Docker containers. This allows attackers to execute arbitrary commands on the host system, potentially compromising the entire server (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.3.0 by replacing child_process.execSync with the safer child_process.execFileSync API, which accepts arguments as a separate array and prevents shell interpretation. Users should upgrade to version 1.3.0 or later to receive the security fix (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23744CRITICAL9.8
  • JavaScriptJavaScript
  • @mcpjam/inspector
NoYesJan 16, 2026
CVE-2026-23735HIGH8.7
  • JavaScriptJavaScript
  • graphql-modules
NoYesJan 16, 2026
GHSA-gw32-9rmw-qwwwHIGH8.4
  • JavaScriptJavaScript
  • svelte
NoYesJan 16, 2026
CVE-2026-23745HIGH8.2
  • JavaScriptJavaScript
  • nodejs-full-i18n
NoYesJan 16, 2026
GHSA-38cw-85xc-xr9xMEDIUM6.8
  • JavaScriptJavaScript
  • @veramo/data-store
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management