CVE-2026-6878
Received Received - Intake
Sandbox Escape Vulnerability in ByteDance verl math_equal Function

Publication date: 2026-04-23

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in ByteDance verl up to 0.7.0. Affected is the function math_equal of the file prime_math/grader.py. The manipulation leads to sandbox issue. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-23
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bytedance verl to 0.7.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-265
CWE-264 Permissions, Privileges, and Access Controls
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ByteDance verl up to version 0.7.0, specifically in the function math_equal within the file prime_math/grader.py. The issue involves manipulation that leads to a sandbox escape or sandbox issue, meaning an attacker could potentially break out of restricted execution environments.

The attack can be initiated remotely, but it is considered to have a high complexity and is difficult to exploit. Despite this, a public exploit is available.

The vendor was contacted early about this vulnerability but did not respond.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to escape the sandbox environment remotely, potentially leading to unauthorized access or execution of code outside the intended restricted environment.

Because the exploit is publicly available, there is a risk that attackers could use it to compromise systems running the affected ByteDance verl versions.

However, the attack complexity is high and exploitability is difficult, which may reduce the likelihood of successful exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart