Vulnerability Description
A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chaiscript | Chaiscript | <= 6.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/ChaiScript/ChaiScript/Product
- https://github.com/ChaiScript/ChaiScript/issues/635Issue Tracking
- https://github.com/ChaiScript/ChaiScript/issues/635#issue-3828258513Issue Tracking
- https://vuldb.com/?ctiid.348268Permissions RequiredVDB Entry
- https://vuldb.com/?id.348268Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.761301Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3382?
CVE-2026-3382 is a vulnerability with a CVSS score of 3.3 (LOW). A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Perfor...
How severe is CVE-2026-3382?
CVE-2026-3382 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3382?
Check the references section above for vendor advisories and patch information. Affected products include: Chaiscript Chaiscript.