CVE-2026-2662

A weakness has been identified in FascinatedBox lily up to 2.3. This vulnerability affects the function count_transforms of the file src/lily_emitter.c. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/FascinatedBox/lily/ Product
https://github.com/FascinatedBox/lily/issues/381 Exploit Issue Tracking Third Party Advisory
https://github.com/oneafter/0122/blob/main/i381/repro.lily Exploit
https://vuldb.com/?ctiid.346460 Permissions Required VDB Entry
https://vuldb.com/?id.346460 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753166 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:lily-lang:lily:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-18 20:18

Updated : 2026-02-20 20:03


NVD link : CVE-2026-2662

Mitre link : CVE-2026-2662

CVE.ORG link : CVE-2026-2662


JSON object : View

Products Affected

lily-lang

  • lily
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write