CVE-2025-59532
JavaScript vulnerability analysis and mitigation

Overview

A sandbox bypass vulnerability (CVE-2025-59532) was discovered in OpenAI's Codex CLI versions 0.2.0 through 0.38.0 and Codex IDE Extension (VS Code) versions up to 0.4.11. The vulnerability was discovered in September 2025 and allows attackers to bypass sandbox boundaries due to a bug in the path configuration logic (GitHub Advisory).

Technical details

The vulnerability stems from a bug in the sandbox configuration logic where Codex CLI could treat a model-generated current working directory (cwd) as the sandbox's writable root, including paths outside of the folder where the user started their session. This logic flaw bypassed the intended workspace boundary restrictions. The vulnerability has a CVSS v4 score of 8.6 (High) with the following vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

The vulnerability enables arbitrary file writes and command execution wherever the Codex process has permissions, though it did not impact the network-disabled sandbox restriction. This could potentially allow attackers to execute commands and modify files outside the intended sandbox boundaries (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Codex CLI version 0.39.0 and Codex IDE Extension version 0.4.12. The fix canonicalizes and validates that the boundary used for sandbox policy is based on where the user started the session, not the one generated by the model. Users running affected versions should update immediately via their package manager or by reinstalling the latest Codex CLI to ensure sandbox boundaries are enforced (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59532HIGH8.6
  • JavaScriptJavaScript
  • @openai/codex
NoYesSep 22, 2025
CVE-2025-59430HIGH8.2
  • JavaScriptJavaScript
  • @meshconnect/web-link-sdk
NoYesSep 22, 2025
CVE-2025-59433MEDIUM5.3
  • JavaScriptJavaScript
  • @conventional-changelog/git-client
NoYesSep 22, 2025
CVE-2025-59526LOW2.7
  • JavaScriptJavaScript
  • mailgen
NoYesSep 22, 2025
GHSA-g38c-wxjf-xrh6HIGHN/A
  • JavaScriptJavaScript
  • git-commiters
NoYesSep 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management