Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

Summary

A critical vulnerability in the Terrarium Python sandbox, tracked as CVE-2026-5752, allows for arbitrary code execution with root privileges on the host process. This is achieved through JavaScript prototype chain traversal, enabling attackers to escape the sandbox and gain control of the host.

IFF Assessment

FOE

This vulnerability is bad news for defenders as it allows attackers to gain root-level access to host systems by escaping a security sandbox.

Severity

9.3 Critical

The CVSS score of 9.3 indicates a critical severity, stemming from the potential for arbitrary code execution with root privileges and a successful sandbox escape, which allows for significant impact on the host system.

Defender Context

Defenders should be aware of this vulnerability in sandbox environments like Terrarium and ensure they are patching or mitigating the risks associated with prototype chain traversal exploits. This highlights the ongoing challenge of securing containerized and sandboxed execution environments, especially when third-party code or complex JavaScript interactions are involved.

Read Full Story →