A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/0122/blob/main/i1221/repro | Exploit |
| https://github.com/wren-lang/wren/ | Product |
| https://github.com/wren-lang/wren/issues/1221 | Exploit Vendor Advisory |
| https://vuldb.com/?ctiid.346455 | Third Party Advisory VDB Entry |
| https://vuldb.com/?id.346455 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.752791 | Third Party Advisory VDB Entry |
Configurations
History
20 Feb 2026, 20:07
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wren
Wren wren |
|
| CPE | cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/oneafter/0122/blob/main/i1221/repro - Exploit | |
| References | () https://github.com/wren-lang/wren/ - Product | |
| References | () https://github.com/wren-lang/wren/issues/1221 - Exploit, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.346455 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.346455 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.752791 - Third Party Advisory, VDB Entry |
18 Feb 2026, 17:21
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 17:21
Updated : 2026-02-20 20:07
NVD link : CVE-2026-2657
Mitre link : CVE-2026-2657
CVE.ORG link : CVE-2026-2657
JSON object : View
Products Affected
wren
- wren
