CVE-2026-3387
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with local access to crash the wren programming environment by causing a null pointer error when certain functions are called. It requires the attacker to have access to the system where wren is running, making it less of a threat for remote attacks but still a concern for local users.
Technical Description
A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 1, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
wren
Product
wren