CVE-2026-2657

A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/oneafter/0122/blob/main/i1221/repro Exploit
https://github.com/wren-lang/wren/ Product
https://github.com/wren-lang/wren/issues/1221 Exploit Vendor Advisory
https://vuldb.com/?ctiid.346455 Third Party Advisory VDB Entry
https://vuldb.com/?id.346455 Third Party Advisory VDB Entry
https://vuldb.com/?submit.752791 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*

History

20 Feb 2026, 20:07

Type Values Removed Values Added
First Time Wren
Wren wren
CPE cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en wren-lang wren hasta 0.4.0. que afecta a la función printError del archivo src/vm/wren_compiler.c del componente Error Message Handler. Su explotación conduce a un desbordamiento de búfer basado en pila. El ataque debe ser abordado localmente. El exploit ha sido divulgado al público y puede ser usado. El proyecto fue informado del problema tempranamente a través de un informe de problema pero no ha respondido aún.
References () https://github.com/oneafter/0122/blob/main/i1221/repro - () https://github.com/oneafter/0122/blob/main/i1221/repro - Exploit
References () https://github.com/wren-lang/wren/ - () https://github.com/wren-lang/wren/ - Product
References () https://github.com/wren-lang/wren/issues/1221 - () https://github.com/wren-lang/wren/issues/1221 - Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.346455 - () https://vuldb.com/?ctiid.346455 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.346455 - () https://vuldb.com/?id.346455 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.752791 - () https://vuldb.com/?submit.752791 - Third Party Advisory, VDB Entry

18 Feb 2026, 17:21

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 17:21

Updated : 2026-02-20 20:07


NVD link : CVE-2026-2657

Mitre link : CVE-2026-2657

CVE.ORG link : CVE-2026-2657


JSON object : View

Products Affected

wren

  • wren
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow