radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

sourceThe Hacker News
calendar_todayApril 22, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical Flaw in Terrarium Sandbox Allows Root Code Execution

Summary

A critical vulnerability has been identified in the Terrarium sandbox, a Python-based environment, which could lead to arbitrary code execution with root privileges. This flaw is tracked as CVE-2026-5752 and poses a significant security risk.

Key Points

  • The vulnerability is found in the Terrarium sandbox, a Python-based application.
  • It is identified as CVE-2026-5752.
  • The flaw allows for arbitrary code execution with root privileges.
  • The vulnerability is rated 9.3 on the CVSS scale, indicating its critical nature.
  • The issue involves a JavaScript prototype chain traversal, enabling sandbox escape.

Analysis

The discovery of this critical vulnerability in the Terrarium sandbox highlights the potential risks associated with sandbox environments, which are typically used to isolate and test code securely. The ability to execute arbitrary code with root privileges represents a severe threat, as it can lead to unauthorized access and control over the host system. This underscores the importance of regular security assessments and updates to sandbox environments.

Conclusion

IT professionals should immediately assess their use of the Terrarium sandbox and apply any available patches or mitigations. Regularly reviewing and updating sandbox environments is crucial to maintaining security and preventing exploitation of such vulnerabilities.