Description
A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stack-Based Buffer Overflow
Action: Patching
AI Analysis

Impact

The vulnerability lies in the printError function of wren's compiler component, where improper handling of error messages can overflow a stack buffer. This flaw allows an attacker with local access to corrupt the stack, potentially leading to execution of arbitrary code or a crash. The weakness corresponds to CWE-119 and CWE-121, indicating unsafe memory handling and lack of bounds checking. The impact is confined to denial of service or local privilege escalation, depending on the execution context of the vulnerable process.

Affected Systems

The affected product is wren-lang’s Wren interpreter, up to version 0.4.0. No later version information is provided, so any installation of the specified range should be considered vulnerable. The vulnerability is tied to the wren component listed as wren-lang:wren in the CNA data.

Risk and Exploitability

The CVSS base score is 4.8, indicating a low to moderate severity. The EPSS score is below 1 percent, showing a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attack execution requires local access, so remote exploitation is unlikely without additional compromise. The lack of a public exploit suggests limited exploitation, but the local nature of the vulnerability means it can be abused by users with sufficient privileges on the host running Wren.

Generated by OpenCVE AI on April 18, 2026 at 11:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Wren interpreter to a newer version that patches the printError buffer overflow.
  • If no patched version is available, avoid executing untrusted or arbitrary Wren code on vulnerable systems.
  • Recompile Wren with stack protection options such as compiler flags for stack guard or address sanitizer to detect potential overflows.

Generated by OpenCVE AI on April 18, 2026 at 11:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Wren
Wren wren
CPEs cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*
Vendors & Products Wren
Wren wren

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wren-lang
Wren-lang wren
Vendors & Products Wren-lang
Wren-lang wren

Wed, 18 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title wren-lang wren Error Message wren_compiler.c printError stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:18:07.494Z

Reserved: 2026-02-18T06:46:13.637Z

Link: CVE-2026-2657

cve-icon Vulnrichment

Updated: 2026-02-18T18:00:43.381Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T17:21:40.400

Modified: 2026-02-20T20:07:21.720

Link: CVE-2026-2657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses