CVE-2026-2659

A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument _target_stack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/albertodemichelis/squirrel/issues/311 Exploit Issue Tracking
https://github.com/oneafter/0122/blob/main/i311/repro Exploit
https://vuldb.com/?ctiid.346457 Permissions Required VDB Entry
https://vuldb.com/?id.346457 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753163 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:squirrel-lang:squirrel:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-18 18:24

Updated : 2026-02-20 20:05


NVD link : CVE-2026-2659

Mitre link : CVE-2026-2659

CVE.ORG link : CVE-2026-2659


JSON object : View

Products Affected

squirrel-lang

  • squirrel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read