CVE-2026-3384
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to cause a program using ChaiScript to crash by creating an endless loop of function calls, leading to a situation called uncontrolled recursion. The attack can only be carried out locally, meaning the attacker needs access to the system where ChaiScript is running.
Technical Description
A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 1, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
chaiscript
Product
chaiscript
Related Vulnerabilities
This vulnerability allows an attacker with local access to crash the ChaiScript application by triggering a divide by zero error. The exploit is publicly available, meaning it could be used by anyone who can access the system where ChaiScript is running.
This vulnerability allows an attacker to corrupt memory in ChaiScript, potentially leading to crashes or unauthorized access to sensitive information. However, the attacker must have local access to the system to exploit this flaw.