vm2 is a sandbox that can run untrusted code with whitelisted Node’s built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js
github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873
github.com/patriksimek/vm2/issues/467
github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq
security.netapp.com/advisory/ntap-20221017-0002/
www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067