Description
A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-20
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Information Exposure
Action: Assess Impact
AI Analysis

Impact

The vulnerability is located in the wren compiler where the peekChar function reads past the end of a buffer, allowing an attacker with local execution rights to read arbitrary memory that belongs to the process. This memory read can disclose sensitive data such as compilation state, intermediate data structures, or even credentials if that memory region holds such values. The flaw is an unsafe memory operation, corresponding to the CWE identifiers for out‑of‑bounds read. The primary impact is confidentiality compromise, as the data read is not used to modify the program’s state, but it could assist further attacks if combined with other vulnerabilities.

Affected Systems

The affected product is wren-lang wren, with all releases up to version 0.4.0 vulnerable. No patch or fix has been released and the maintainers have not yet responded to the issue report. Any system that compiles or interprets Wren scripts locally and uses these builds is impacted.

Risk and Exploitability

The CVSS score of 4.8 signifies a moderate risk, but the EPSS score of less than 1 % and the absence of a KEV listing indicate a low likelihood of real‑world exploitation at present. The vulnerability requires a local attacker to supply input that triggers the out‑of‑bounds read, so anyone who can run code in the wren compiler environment can exploit it. Although the exploit code is publicly available, the lack of a ready‑made product or remote execution path limits the threat to environments where local users have write or execute access to the compiler.

Generated by OpenCVE AI on April 18, 2026 at 11:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched release of wren once the maintainers publish an update, or rebuild from the latest source that includes the bounds‑check fix.
  • If an official patch is not yet available, apply the local patch described in the issue comments or compile a fork with a corrected peekChar implementation and secure the build environment.
  • Limit the execution of untrusted Wren scripts by isolating the compiler in a container or using SELinux/AppArmor profiles, so that local users cannot trigger the out‑of‑bounds read.

Generated by OpenCVE AI on April 18, 2026 at 11:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Wren
Wren wren
CPEs cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*
Vendors & Products Wren
Wren wren

Wed, 25 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Wren-lang
Wren-lang wren
Vendors & Products Wren-lang
Wren-lang wren

Fri, 20 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title wren-lang wren Source File wren_compiler.c peekChar out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T14:50:28.182Z

Reserved: 2026-02-20T10:49:27.958Z

Link: CVE-2026-2858

cve-icon Vulnrichment

Updated: 2026-02-24T14:50:24.115Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T22:16:30.000

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2858

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:30:44Z

Weaknesses