Stack-based Buffer Overflow Vulnerability in Wren-lang Compiler by Wren-lang
CVE-2026-2657
Key Information:
Badges
What is CVE-2026-2657?
A stack-based buffer overflow vulnerability has been identified in the Wren programming language, affecting versions up to 0.4.0. This issue is present in the printError function within the src/vm/wren_compiler.c file, where improper handling of error messages can result in local exploitation risks. The vulnerability was disclosed publicly, and while the project was made aware of the issue through an early report, no response has been provided. Users are encouraged to review and apply necessary mitigations to secure their applications.
Affected Version(s)
wren 0.1
wren 0.2
wren 0.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
