Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
Wren up to 0.4.0: Null Pointer Error Can Crash the Interpreter
CVE-2026-3387
Summary
The Wren programming language's interpreter is vulnerable to a crash if a malicious program intentionally causes the interpreter to try to access a null reference. This requires the attacker to have local access to the interpreter. You should update to a version of Wren that fixes this issue as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wren | wren | <= 0.4.0 | – |
Original title
A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null poi...
Original description
A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0
1.7
nvd CVSS3.1
5.5
nvd CVSS4.0
4.8
Vulnerability type
CWE-404
CWE-476
NULL Pointer Dereference
- https://github.com/oneafter/0122/blob/main/i1220/repro Exploit
- https://github.com/wren-lang/wren/ Product
- https://github.com/wren-lang/wren/issues/1220 Exploit Issue Tracking Vendor Advisory
- https://vuldb.com/?ctiid.348273 Permissions Required VDB Entry
- https://vuldb.com/?id.348273 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.761312 Third Party Advisory VDB Entry
Published: 1 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026