Vulnerability Description
A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wren | Wren | <= 0.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/oneafter/0122/blob/main/i1219/reproExploit
- https://github.com/wren-lang/wren/Product
- https://github.com/wren-lang/wren/issues/1219ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.348272Permissions RequiredVDB Entry
- https://vuldb.com/?id.348272Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.761306Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3386?
CVE-2026-3386 is a vulnerability with a CVSS score of 3.3 (LOW). A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possib...
How severe is CVE-2026-3386?
CVE-2026-3386 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3386?
Check the references section above for vendor advisories and patch information. Affected products include: Wren Wren.