Description
A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-01
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via uncontrolled recursion
Action: Assess Impact
AI Analysis

Impact

The vulnerability lies in a manipulation of the Function_Push_Pop functionality within chaiscript_eval.hpp, allowing an attacker to trigger uncontrolled recursion. This leads to a stack overflow that can crash an application, resulting in denial of service. The weakness is identified as CWE-404 (Improper Resource Shutdown or Release) and CWE-674 (Uncontrolled Recursion).

Affected Systems

All installations of ChaiScript up to version 6.1.0 are affected, as noted in the ChaiScript project documentation and the issue tracker. The single affected product is the ChaiScript interpreter itself, available under the CPE string cpe:2.3:a:chaiscript:chaiscript:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability has not been listed in the CISA KEV catalog. Attack requires local access to the system running the interpreter, so external exposure is limited. Since the exploit has been publicly disclosed but no patch is available, the risk is primarily for systems running untrusted ChaiScript code in local environments.

Generated by OpenCVE AI on April 16, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a ChaiScript version newer than 6.1.0 that addresses the recursion failure.
  • If an upgrade is not immediately possible, enforce strict access controls to limit who can run ChaiScript code locally, and limit the use of eval environments to trusted contexts.
  • Implement runtime safeguards such as stack size limits or guard rings to detect and prevent uncontrolled recursion before it causes a full crash.

Generated by OpenCVE AI on April 16, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chaiscript:chaiscript:*:*:*:*:*:*:*:*

Mon, 02 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Chaiscript
Chaiscript chaiscript
Vendors & Products Chaiscript
Chaiscript chaiscript

Sun, 01 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title ChaiScript chaiscript_eval.hpp Function_Push_Pop recursion
Weaknesses CWE-404
CWE-674
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Chaiscript Chaiscript
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T19:33:41.374Z

Reserved: 2026-02-28T14:23:22.407Z

Link: CVE-2026-3384

cve-icon Vulnrichment

Updated: 2026-03-02T19:33:37.690Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T08:15:57.430

Modified: 2026-03-05T22:30:17.643

Link: CVE-2026-3384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:00:14Z

Weaknesses