Description
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in CardboardPowered cardboard (src/main/java/org/cardboardpowered/impl/world modules). This vulnerability is associated with program files WorldImpl.Java.

This issue affects cardboard: before 1.21.4.
Published: 2026-01-27
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Potential memory corruption due to a buffer overflow that could lead to remote code execution
Action: Immediate Patch
AI Analysis

Impact

An improper restriction of operations within the bounds of a memory buffer exists in the CardboardPowered cardboard server implementation. The flaw is located in the world unloading logic, specifically within the WorldImpl.Java module. When a world chunk is unloaded, data is not correctly bounded before being written or read, which can corrupt memory. This vulnerability may allow an attacker to overwrite critical data structures or execute arbitrary code. The description does not explicitly state a confirmed exploit, but the nature of the flaw suggests the potential for remote code execution or denial of service.

Affected Systems

The affected product is CardboardPowered cardboard. All versions prior to 1.21.4 are vulnerable. No other vendors or product versions are listed in the CVE record.

Risk and Exploitability

The CVSS score of 9.2 indicates a high severity. EPSS is reported as less than 1%, meaning the probability of exploitation is currently very low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves a malicious user triggering the world chunk unloading process through the server’s management interface or by manipulating player movement, which would require access to the server environment. While no active exploits are known, the high CVSS combined with the memory corruption potential means that, if exploited, an attacker could hijack execution flow, gain privileged access, or disrupt service.

Generated by OpenCVE AI on April 18, 2026 at 14:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to CardboardPowered cardboard version 1.21.4 or newer to address the buffer overflow in world chunk unloading logic.
  • If an immediate upgrade is not possible, disable or restrict the world chunk unloading feature in the server configuration to limit exposure to the vulnerability.
  • Monitor for abnormal world unload activity to detect potential exploitation attempts.

Generated by OpenCVE AI on April 18, 2026 at 14:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cardboardpowered
Cardboardpowered cardboard
Vendors & Products Cardboardpowered
Cardboardpowered cardboard

Tue, 27 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in CardboardPowered cardboard (src/main/java/org/cardboardpowered/impl/world modules). This vulnerability is associated with program files WorldImpl.Java. This issue affects cardboard: before 1.21.4.
Title Chunk Unloading Security Vulnerability in CardboardPowered/cardboard
Weaknesses CWE-119
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/AU:Y/R:A/V:C/RE:M/U:Red'}


Subscriptions

Cardboardpowered Cardboard
cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T21:39:21.583Z

Reserved: 2026-01-27T08:18:43.267Z

Link: CVE-2026-24794

cve-icon Vulnrichment

Updated: 2026-01-27T21:10:11.365Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:49.090

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:00:03Z

Weaknesses