Description
Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write.This issue affects Escargot:commit hash 
97e8115ab1110bc502b4b5e4a0c689a71520d335

.
Published: 2026-04-13
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential code execution due to heap overflow
Action: Patch ASAP
AI Analysis

Impact

A heap‑based buffer overflow in Samsung Open Source Escargot permits an out‑of‑bounds write that could lead to arbitrary code execution or a denial of service. This vulnerability stems from improper bounds checking when handling input data in the engine, allowing malicious content to corrupt memory and potentially overwrite executable code or pointers. The official CWE identifier for this weakness is CWE‑122, which describes heap buffer overflows that may compromise software integrity and availability.

Affected Systems

The issue impacts the Escargot JavaScript engine provided by Samsung Open Source. Vulnerable versions include the code snapshot identified by the commit hash 97e8115ab1110bc502b4b5e4a0c689a71520d335, as referenced in the GitHub pull request. Administrators should verify whether their deployment uses this commit or an earlier, unpatched state.

Risk and Exploitability

The CVSS score of 7.4 reflects a high severity risk, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attacker would need to supply crafted input to the affected component, most likely via local interaction or possibly through remote input if the engine processes externally sourced scripts. The lack of an EPSS score provides limited insight into the real‑world exploitation probability, but the high CVSS indicates a significant potential impact if exploited.

Generated by OpenCVE AI on April 13, 2026 at 07:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch included in GitHub pull request 1554 that addresses the out‑of‑bounds write in Escargot
  • Upgrade Escargot to a version that excludes commit 97e8115ab1110bc502b4b5e4a0c689a71520d335 or later
  • If a patch is not immediately available, restrict the execution of untrusted scripts or disable features that trigger the vulnerable code path
  • Monitor system logs for signs of buffer overflow attempts or abnormal memory usage patterns

Generated by OpenCVE AI on April 13, 2026 at 07:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Escargot Heap Buffer Overflow Allowing Out‑of‑Bounds Write

Mon, 13 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Samsung Open Source
Samsung Open Source escargot
Vendors & Products Samsung Open Source
Samsung Open Source escargot

Mon, 13 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H'}

cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 13 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description Heap-based buffer overflow vulnerability in Samsung Open Source Escargot allows out-of-bounds write.This issue affects Escargot:commit hash  97e8115ab1110bc502b4b5e4a0c689a71520d335 .
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H'}


Subscriptions

Samsung Open Source Escargot
cve-icon MITRE

Status: PUBLISHED

Assigner: samsung.tv_appliance

Published:

Updated: 2026-04-13T13:17:22.969Z

Reserved: 2026-01-30T06:07:11.090Z

Link: CVE-2026-25205

cve-icon Vulnrichment

Updated: 2026-04-13T13:17:16.953Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T05:16:02.407

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-25205

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:09Z

Weaknesses