Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
2.0

ChaiScript, up to 6.1.0, Exposes Data After It's Been Freed

CVE-2026-2656
Summary

A security flaw in ChaiScript, a JavaScript-like scripting language, can allow an attacker with local access to access data that has already been deleted. This could lead to unpredictable behavior or crashes. We recommend updating to the latest version of ChaiScript, which should fix this issue, as soon as possible.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
chaiscript chaiscript <= 6.1.0 –
Original title
A flaw has been found in ChaiScript up to 6.1.0. This affects the function chaiscript::Type_Info::bare_equal of the file include/chaiscript/dispatchkit/type_info.hpp. This manipulation causes use a...
Original description
A flaw has been found in ChaiScript up to 6.1.0. This affects the function chaiscript::Type_Info::bare_equal of the file include/chaiscript/dispatchkit/type_info.hpp. This manipulation causes use after free. The attack requires local access. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0 1.0
nvd CVSS3.1 2.5
nvd CVSS4.0 2.0
Vulnerability type
CWE-119 Buffer Overflow
CWE-416 Use After Free
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026