Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
Squirrel up to 3.2: Local Code Execution through Null Pointer Dereference
CVE-2026-3389
Summary
A security issue in Squirrel version 3.2 or earlier can allow an attacker with local access to potentially execute malicious code. This could happen if a specific manipulation is carried out. We recommend updating to the latest version of Squirrel to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| squirrel-lang | squirrel | <= 3.2 | – |
Original title
A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null point...
Original description
A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0
1.7
nvd CVSS3.1
5.5
nvd CVSS4.0
4.8
Vulnerability type
CWE-404
CWE-476
NULL Pointer Dereference
- https://github.com/albertodemichelis/squirrel/issues/314 Exploit Issue Tracking Vendor Advisory
- https://github.com/oneafter/0122/blob/main/i314/repro Exploit
- https://vuldb.com/?ctiid.348275 Permissions Required VDB Entry
- https://vuldb.com/?id.348275 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.761315 Third Party Advisory VDB Entry
Published: 1 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026