Description
A weakness has been identified in universal-ctags ctags up to 6.2.1. The affected element is the function parseExpression/parseExprList of the file parsers/v.c of the component V Language Parser. Executing a manipulation can lead to uncontrolled recursion. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via uncontrolled recursion
Action: Patch
AI Analysis

Impact

The vulnerability resides in the parseExpression and parseExprList functions of the V Language parser within universal‑ctags. A crafted input can cause the parser to recur without bounds, ultimately exhausting the call stack or available memory, and thus incapacitating the process. This uncontrolled recursion is classified under CWE‑835 and involves improper resource handling (CWE‑674).

Affected Systems

The affected product is universal‑ctags, specifically the ctags component. Versions up to and including 6.2.1 are vulnerable. Any installation that utilizes the V Language parser implementation in parsers/v.c may be impacted.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity. The EPSS score is below 1%, which suggests a low probability of exploitation on the public internet. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation at this time. Based on the description, it is inferred that the attack requires local or privileged execution on the host running ctags, as the manipulated input must be parsed by the V Language parser. The attacker could use the public exploit code to trigger the recursive parse, causing the process to crash or hang, resulting in a denial of service.

Generated by OpenCVE AI on April 17, 2026 at 18:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade universal‑ctags to a version newer than 6.2.1 once a fix is released.
  • If the V Language parser is not required, disable or remove that parsing feature to eliminate the recursion path.
  • Keep an eye on the upstream issue tracker and apply any patches or security advisories as soon as they become available.

Generated by OpenCVE AI on April 17, 2026 at 18:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-835
References
Metrics threat_severity

None

threat_severity

Low


Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Universal-ctags
Universal-ctags ctags
Vendors & Products Universal-ctags
Universal-ctags ctags

Wed, 18 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in universal-ctags ctags up to 6.2.1. The affected element is the function parseExpression/parseExprList of the file parsers/v.c of the component V Language Parser. Executing a manipulation can lead to uncontrolled recursion. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Title universal-ctags V Language v.c parseExprList recursion
Weaknesses CWE-404
CWE-674
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Universal-ctags Ctags
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:16:38.144Z

Reserved: 2026-02-17T20:23:22.618Z

Link: CVE-2026-2641

cve-icon Vulnrichment

Updated: 2026-02-18T20:30:58.334Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T06:16:35.517

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2641

cve-icon Redhat

Severity : Low

Publid Date: 2026-02-18T05:32:07Z

Links: CVE-2026-2641 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:00:11Z

Weaknesses