Description
A flaw has been found in ggml-org llama.cpp up to 55abc39. Impacted is the function llama_grammar_advance_stack of the file llama.cpp/src/llama-grammar.cpp of the component GBNF Grammar Handler. This manipulation causes stack-based buffer overflow. The attack needs to be launched locally. The exploit has been published and may be used. Patch name: 18993. To fix this issue, it is recommended to deploy a patch.
Published: 2026-02-06
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Stack Buffer Overflow
Action: Apply Patch
AI Analysis

Impact

A stack-based buffer overflow has been discovered in the llama_grammar_advance_stack function of ggml-org’s llama.cpp, affecting versions up to the 55abc39 commit. The flaw occurs when the GBNF Grammar Handler processes malformed input and overflows a local stack buffer. Attackers must operate locally on the machine running llama.cpp, but once the overflow is triggered, the attacker may gain arbitrary code execution on that system.

Affected Systems

ggml-org’s llama.cpp up to commit 55abc39 is affected. No specific sub‑release versions are listed beyond this commit identifier.

Risk and Exploitability

The CVSS score is 4.8, indicating low severity, and the EPSS score is below 1%, meaning the likelihood of exploitation is minimal. The vulnerability is not listed in CISA’s KEV catalog. Because the attack requires local execution, the risk is confined to systems where a malicious user has local access. Nonetheless, the presence of a publicly available exploit means that any local user who can feed crafted grammar input could potentially trigger arbitrary code execution.

Generated by OpenCVE AI on April 17, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch referenced as 18993, updating llama.cpp to a commit after 55abc39.
  • Restrict or sandbox any local user accounts that can invoke the llama.cpp executable, preventing unauthorized manipulation of grammar input.
  • Configure runtime memory protection tools, such as Address Sanitizer or stack canaries, to detect and prevent stack-based overflows during execution.

Generated by OpenCVE AI on April 17, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Ggml
Ggml llama.cpp
Vendors & Products Ggml
Ggml llama.cpp

Fri, 06 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in ggml-org llama.cpp up to 55abc39. Impacted is the function llama_grammar_advance_stack of the file llama.cpp/src/llama-grammar.cpp of the component GBNF Grammar Handler. This manipulation causes stack-based buffer overflow. The attack needs to be launched locally. The exploit has been published and may be used. Patch name: 18993. To fix this issue, it is recommended to deploy a patch.
Title ggml-org llama.cpp GBNF Grammar llama-grammar.cpp llama_grammar_advance_stack stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:28:33.822Z

Reserved: 2026-02-06T07:41:07.150Z

Link: CVE-2026-2069

cve-icon Vulnrichment

Updated: 2026-02-10T15:18:23.357Z

cve-icon NVD

Status : Deferred

Published: 2026-02-06T22:16:12.883

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:30:29Z

Weaknesses