A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Project Subscriptions

Vendors Products
Chaiscript Subscribe
Chaiscript Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chaiscript:chaiscript:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Chaiscript
Chaiscript chaiscript
Vendors & Products Chaiscript
Chaiscript chaiscript

Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title ChaiScript chaiscript_defines.hpp operator use after free
Weaknesses CWE-119
CWE-416
References
Metrics cvssV2_0

{'score': 1, 'vector': 'AV:L/AC:H/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.5, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-18T14:39:51.039Z

Reserved: 2026-02-18T06:43:13.411Z

Link: CVE-2026-2655

cve-icon Vulnrichment

Updated: 2026-02-18T14:39:21.859Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T14:16:07.490

Modified: 2026-02-19T17:22:36.310

Link: CVE-2026-2655

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-19T10:19:52Z

Weaknesses