{"api_version":"1","generated_at":"2026-04-14T22:33:33+00:00","cve":"CVE-2026-5752","urls":{"html":"https://cve.report/CVE-2026-5752","api":"https://cve.report/api/cve/CVE-2026-5752.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5752","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5752"},"summary":{"title":"CVE-2026-5752","description":"Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.","state":"PUBLISHED","assigner":"certcc","published_at":"2026-04-14 18:17:39","updated_at":"2026-04-14 20:16:48"},"problem_types":["CWE-94 Improper Control of Generation of Code ('Code Injection')","CWE-400 Uncontrolled Resource Consumption","CWE-284 Improper Access Control"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.3","severity":"CRITICAL","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.3","severity":"CRITICAL","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://kb.cert.org/vuls/id/414811","name":"https://kb.cert.org/vuls/id/414811","refsource":"cret@cert.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/cohere-ai/cohere-terrarium","name":"https://github.com/cohere-ai/cohere-terrarium","refsource":"cret@cert.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5752","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5752","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Cohere","product":"cohere-terrarium","version":"affected all","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-5752","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-14T19:21:33.066063Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T19:21:36.083Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"cohere-terrarium","vendor":"Cohere","versions":[{"status":"affected","version":"all"}]}],"descriptions":[{"lang":"en","value":"Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal."}],"problemTypes":[{"descriptions":[{"description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en"}]},{"descriptions":[{"description":"CWE-400 Uncontrolled Resource Consumption","lang":"en"}]},{"descriptions":[{"description":"CWE-284 Improper Access Control","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T17:53:10.330Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"url":"https://kb.cert.org/vuls/id/414811"},{"url":"https://github.com/cohere-ai/cohere-terrarium"}],"source":{"discovery":"UNKNOWN"},"title":"CVE-2026-5752","x_generator":{"engine":"VINCE 3.0.35","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2026-5752"}}},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2026-5752","datePublished":"2026-04-14T17:53:10.330Z","dateReserved":"2026-04-07T16:13:06.702Z","dateUpdated":"2026-04-14T19:21:36.083Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 18:17:39","lastModifiedDate":"2026-04-14 20:16:48","problem_types":["CWE-94 Improper Control of Generation of Code ('Code Injection')","CWE-400 Uncontrolled Resource Consumption","CWE-284 Improper Access Control"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5752","Ordinal":"1","Title":"CVE-2026-5752","CVE":"CVE-2026-5752","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5752","Ordinal":"1","NoteData":"Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.","Type":"Description","Title":"CVE-2026-5752"}]}}}