A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/ChaiScript/ChaiScript/ | Product |
| https://github.com/ChaiScript/ChaiScript/issues/635 | Issue Tracking |
| https://github.com/ChaiScript/ChaiScript/issues/635#issue-3828258513 | Issue Tracking |
| https://vuldb.com/?ctiid.348268 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348268 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.761301 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-03-01 06:15
Updated : 2026-03-05 22:29
NVD link : CVE-2026-3382
Mitre link : CVE-2026-3382
CVE.ORG link : CVE-2026-3382
JSON object : View
Products Affected
chaiscript
- chaiscript
