CVE-2026-2657

A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/oneafter/0122/blob/main/i1221/repro Exploit
https://github.com/wren-lang/wren/ Product
https://github.com/wren-lang/wren/issues/1221 Exploit Vendor Advisory
https://vuldb.com/?ctiid.346455 Third Party Advisory VDB Entry
https://vuldb.com/?id.346455 Third Party Advisory VDB Entry
https://vuldb.com/?submit.752791 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-18 17:21

Updated : 2026-02-20 20:07


NVD link : CVE-2026-2657

Mitre link : CVE-2026-2657

CVE.ORG link : CVE-2026-2657


JSON object : View

Products Affected

wren

  • wren
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow