Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 964

Sandbox Escape

What is Sandbox Escape?

Sandbox EscapeA vulnerability or exploit chain that lets code break out of an isolating sandbox — browser, VM, or hypervisor — to gain code execution in the surrounding host environment.


Sandbox escape refers to defeating a security boundary that was designed to confine untrusted code. The most public examples are browser sandboxes (Chromium's renderer-to-broker boundary, WebKit's WebContent process), language runtimes (V8, JavaScriptCore), application sandboxes (macOS Seatbelt, Windows AppContainer), container engines (runc CVE-2019-5736, Docker breakouts) and full hypervisor escapes (VENOM CVE-2015-3456 in QEMU, the VMware ESXi escapes demonstrated at Pwn2Own 2017 and 2021 by Team Sniper and Synacktiv). Such chains typically combine a memory-corruption bug in the sandboxed process with a kernel or hypervisor-side vulnerability that the sandbox API accidentally exposes. Pwn2Own, Project Zero and the Microsoft MSRC have driven much of the public research, leading to mitigations like Site Isolation, V8 sandbox, and Hyper-V VBS.

Examples

  1. 01

    Chrome 0-day chain at Pwn2Own that escapes the renderer sandbox to execute code in the browser broker.

  2. 02

    VENOM (CVE-2015-3456) escaping the QEMU floppy controller into the host kernel.

Frequently asked questions

What is Sandbox Escape?

A vulnerability or exploit chain that lets code break out of an isolating sandbox — browser, VM, or hypervisor — to gain code execution in the surrounding host environment. It belongs to the Defense & Operations category of cybersecurity.

What does Sandbox Escape mean?

A vulnerability or exploit chain that lets code break out of an isolating sandbox — browser, VM, or hypervisor — to gain code execution in the surrounding host environment.

How does Sandbox Escape work?

Sandbox escape refers to defeating a security boundary that was designed to confine untrusted code. The most public examples are browser sandboxes (Chromium's renderer-to-broker boundary, WebKit's WebContent process), language runtimes (V8, JavaScriptCore), application sandboxes (macOS Seatbelt, Windows AppContainer), container engines (runc CVE-2019-5736, Docker breakouts) and full hypervisor escapes (VENOM CVE-2015-3456 in QEMU, the VMware ESXi escapes demonstrated at Pwn2Own 2017 and 2021 by Team Sniper and Synacktiv). Such chains typically combine a memory-corruption bug in the sandboxed process with a kernel or hypervisor-side vulnerability that the sandbox API accidentally exposes. Pwn2Own, Project Zero and the Microsoft MSRC have driven much of the public research, leading to mitigations like Site Isolation, V8 sandbox, and Hyper-V VBS.

How do you defend against Sandbox Escape?

Defences for Sandbox Escape typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Sandbox Escape?

Common alternative names include: VM escape, Hypervisor escape, Browser sandbox escape.

Related terms

See also