CVE-2026-2858

A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/oneafter/0122/blob/main/i1217/repro Issue Tracking Product
https://github.com/wren-lang/wren/ Product
https://github.com/wren-lang/wren/issues/1217 Issue Tracking
https://vuldb.com/?ctiid.347097 Permissions Required VDB Entry
https://vuldb.com/?id.347097 Third Party Advisory VDB Entry
https://vuldb.com/?submit.754489 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-20 22:16

Updated : 2026-02-26 02:35


NVD link : CVE-2026-2858

Mitre link : CVE-2026-2858

CVE.ORG link : CVE-2026-2858


JSON object : View

Products Affected

wren

  • wren
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read