Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
Wren up to 0.4.0 allows attackers to crash the program
CVE-2026-2657
Summary
A security issue in Wren's error message handling could allow an attacker to cause a Wren program to crash. This issue affects Wren versions up to 0.4.0. To protect yourself, update Wren to a version newer than 0.4.0.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wren | wren | <= 0.4.0 | – |
Original title
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads...
Original description
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0
1.7
nvd CVSS3.1
5.5
nvd CVSS4.0
4.8
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- https://github.com/oneafter/0122/blob/main/i1221/repro Exploit
- https://github.com/wren-lang/wren/ Product
- https://github.com/wren-lang/wren/issues/1221 Exploit Vendor Advisory
- https://vuldb.com/?ctiid.346455 Third Party Advisory VDB Entry
- https://vuldb.com/?id.346455 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.752791 Third Party Advisory VDB Entry
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026