CVE-2025-61927: Happy DOM: VM Context Escape can lead to Remote Code Execution
(updated )
Happy DOM v19 and lower contains a security vulnerability that puts the owner system at the risk of RCE (Remote Code Execution) attacks.
A Node.js VM Context is not an isolated environment, and if the user runs untrusted JavaScript code within the Happy DOM VM Context, it may escape the VM and get access to process level functionality.
It seems like what the attacker can get control over depends on if the process is using ESM or CommonJS. With CommonJS the attacker can get hold of the require() function to import modules.
Happy DOM has JavaScript evaluation enabled by default. This may not be obvious to the consumer of Happy DOM and can potentially put the user at risk if untrusted code is executed within the environment.
References
- github.com/advisories/GHSA-37j7-fg3j-429f
- github.com/capricorn86/happy-dom
- github.com/capricorn86/happy-dom/commit/819d15ba289495439eda8be360d92a614ce22405
- github.com/capricorn86/happy-dom/commit/de438ad72921c69793584aa657b48d3655dfac97
- github.com/capricorn86/happy-dom/releases/tag/v20.0.0
- github.com/capricorn86/happy-dom/security/advisories/GHSA-37j7-fg3j-429f
- nvd.nist.gov/vuln/detail/CVE-2025-61927
Code Behaviors & Features
Detect and mitigate CVE-2025-61927 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →