Description
A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-01
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess
AI Analysis

Impact

The issue occurs in the resolveLocal routine of Wren’s compiler and allows a local attacker to trigger uncontrolled recursion. The recursion can exhaust stack or heap resources, resulting in a crash or unresponsive state of the compiling process or the entire host application. The weakness is a classic uncontrolled recursion flaw, reflected in the CWE-674 identifier. No remote execution is possible; the attacker must have local code execution capability to trigger the effect.

Affected Systems

The vulnerability is present in all Wren releases up to and including 0.4.0. No specific sub‑version range is listed beyond the upper bound, and the CVE catalog identifies the vendor as wren-lang and the product as Wren.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity, while the EPSS score of less than 1% signals that public exploitation is currently unlikely. The vulnerability is not in the CISA KEV list. Attacking requires local exploitation, so the attack surface is restricted to insiders or compromised local accounts. A local attacker that can invoke the Wren compiler can force a denial of service by exhausting resources, but no privacy or integrity impact would normally result unless the attacker can influence other processes.

Generated by OpenCVE AI on April 17, 2026 at 13:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest release of Wren that contains the resolveLocal fix; if a fixed version is unavailable, plan a migration path to a patched build.
  • If upgrading is not immediately possible, implement a runtime recursion depth limit in the compiler or employ static analysis tools to detect and flag vulnerable code paths.
  • Restrict local execution of the Wren compiler to trusted users or isolate it in a sandboxed environment to reduce the risk that an attacker can trigger the recursion.

Generated by OpenCVE AI on April 17, 2026 at 13:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Wren
Wren wren
CPEs cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*
Vendors & Products Wren
Wren wren

Mon, 02 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wren-lang
Wren-lang wren
Vendors & Products Wren-lang
Wren-lang wren

Sun, 01 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title wren-lang wren wren_compiler.c resolveLocal recursion
Weaknesses CWE-404
CWE-674
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T19:34:14.330Z

Reserved: 2026-02-28T14:49:52.976Z

Link: CVE-2026-3385

cve-icon Vulnrichment

Updated: 2026-03-02T19:34:10.586Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T09:15:57.040

Modified: 2026-03-10T14:24:15.070

Link: CVE-2026-3385

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses