Impact
A use‑after‑free flaw exists in the chaiscript::str_less::operator implementation within ChaiScript. An attacker with local execution privileges could trigger the vulnerability, potentially leading to memory corruption or program crash. The flaw requires local execution, is complex, and deemed difficult to exploit.
Affected Systems
ChaiScript releases prior to version 6.1.0 are affected. The issue involves the chaiscript_defines.hpp header in the ChaiScript library. No specific vendor versions beyond 6.1.0 are listed.
Risk and Exploitability
The CVSS score of 2.0 indicates a low severity, and the EPSS score of less than 1% further suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, reducing the expectation of in‑the‑wild attacks. Defensive measures must focus on updating the library or applying mitigation workarounds until an official patch is released.
OpenCVE Enrichment