Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.8

Wren up to 0.4.0 allows attackers to crash the program

CVE-2026-2657
Summary

A security issue in Wren's error message handling could allow an attacker to cause a Wren program to crash. This issue affects Wren versions up to 0.4.0. To protect yourself, update Wren to a version newer than 0.4.0.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
wren wren <= 0.4.0 –
Original title
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads...
Original description
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0 1.7
nvd CVSS3.1 5.5
nvd CVSS4.0 4.8
Vulnerability type
CWE-119 Buffer Overflow
CWE-121 Stack-based Buffer Overflow
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026