Description
A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.
Published: 2026-02-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Information Disclosure
Action: Patch
AI Analysis

Impact

The flaw resides in the scan_string function of berry 1.1.0, the language interpreter produced by berry‑lang. An attacker with local access can manipulate input to cause an out‑of‑bounds read, allowing the process to read memory beyond the intended buffer. This read can expose internal program data such as strings, configuration values or other sensitive information, potentially leading to information disclosure.

Affected Systems

Berry language interpreter version 1.1.0, distributed by berry‑lang. Any installation of berry‑lang 1.1.0 that uses the vulnerable scan_string implementation is affected.

Risk and Exploitability

The vulnerability has a CVSS score of 4.8, indicating moderate severity. The EPSS score is below 1%, suggesting a very low current exploitation probability. It is not listed in the CISA KEV catalog. Because local privileges are required, the attack vector is local; a publicly disclosed exploit can be used by users with access to the system, but widespread remote exploitation has not been reported.

Generated by OpenCVE AI on April 16, 2026 at 15:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and apply the patch that implements the fix for the scan_string buffer over‑read, identified by commit 7149c59a39ba44feca261b12f06089f265fec176 from the berry‑lang repository.
  • Rebuild and redeploy the interpreter using the patched source so that any subsequent executions run the fixed version.
  • If the patch cannot be applied immediately, restrict local user privileges or run the interpreter with the least privilege necessary to mitigate the risk of information disclosure.

Generated by OpenCVE AI on April 16, 2026 at 15:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:berry-lang:berry:1.1.0:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Berry-lang
Berry-lang berry
Vendors & Products Berry-lang
Berry-lang berry

Fri, 27 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.
Title berry-lang berry be_lexer.c scan_string out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Berry-lang Berry
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:50:12.298Z

Reserved: 2026-02-26T16:38:46.941Z

Link: CVE-2026-3285

cve-icon Vulnrichment

Updated: 2026-02-27T18:50:09.231Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T03:16:03.397

Modified: 2026-03-02T15:41:29.740

Link: CVE-2026-3285

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses