A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/0122/blob/main/i1217/repro | Issue Tracking Product |
| https://github.com/wren-lang/wren/ | Product |
| https://github.com/wren-lang/wren/issues/1217 | Issue Tracking |
| https://vuldb.com/?ctiid.347097 | Permissions Required VDB Entry |
| https://vuldb.com/?id.347097 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.754489 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-20 22:16
Updated : 2026-02-26 02:35
NVD link : CVE-2026-2858
Mitre link : CVE-2026-2858
CVE.ORG link : CVE-2026-2858
JSON object : View
Products Affected
wren
- wren
