Impact
The vulnerability lies in a manipulation of the Function_Push_Pop functionality within chaiscript_eval.hpp, allowing an attacker to trigger uncontrolled recursion. This leads to a stack overflow that can crash an application, resulting in denial of service. The weakness is identified as CWE-404 (Improper Resource Shutdown or Release) and CWE-674 (Uncontrolled Recursion).
Affected Systems
All installations of ChaiScript up to version 6.1.0 are affected, as noted in the ChaiScript project documentation and the issue tracker. The single affected product is the ChaiScript interpreter itself, available under the CPE string cpe:2.3:a:chaiscript:chaiscript:*:*:*:*:*:*:*:*.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability has not been listed in the CISA KEV catalog. Attack requires local access to the system running the interpreter, so external exposure is limited. Since the exploit has been publicly disclosed but no patch is available, the risk is primarily for systems running untrusted ChaiScript code in local environments.
OpenCVE Enrichment