CVE-2026-3387

A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/oneafter/0122/blob/main/i1220/repro Exploit
https://github.com/wren-lang/wren/ Product
https://github.com/wren-lang/wren/issues/1220 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.348273 Permissions Required VDB Entry
https://vuldb.com/?id.348273 Third Party Advisory VDB Entry
https://vuldb.com/?submit.761312 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-01 10:16

Updated : 2026-03-05 01:50


NVD link : CVE-2026-3387

Mitre link : CVE-2026-3387

CVE.ORG link : CVE-2026-3387


JSON object : View

Products Affected

wren

  • wren
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference