Description
A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-01
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The reported flaw is a null pointer dereference in the getByteCountForArguments function of wren’s compiler, which can cause the interpreter to crash or terminate unexpectedly. Because the error occurs during argument handling, a malformed script or data supplied locally can trigger this failure, resulting in a denial of service for any process running wren. The vulnerability is classified as a local fault; it does not provide the attacker with code execution or privilege escalation capabilities.

Affected Systems

The issue applies to the wren programming language maintained by wren-lang, with affected releases up to and including version 0.4.0. Any systems that embed or run wren scripts built with these versions are potentially vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate risk, and the EPSS score of less than 1 % shows that, at the time of analysis, the probability of exploitation observed in the wild is very low. The vulnerability is only exploitable by someone with local access to the environment running wren; it is not remotely reachable, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Because the exploit has been disclosed publicly, users must monitor for a patch and limit local privileges until a fix is applied. The likely attack vector is local; an attacker would need to supply crafted input to the interpreter.

Generated by OpenCVE AI on April 17, 2026 at 13:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of wren once the security fix is available; this removes the vulnerable code path.
  • If upgrading is not immediately possible, isolate or sandbox any applications that rely on wren so that local users cannot supply arbitrary scripts and restrict write permissions to the compiler source to prevent tampering.
  • Keep an eye on the official wren project’s issue tracker and mailing lists for updates; if a patch or rollback is released, apply it promptly.

Generated by OpenCVE AI on April 17, 2026 at 13:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Wren
Wren wren
CPEs cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:*
Vendors & Products Wren
Wren wren

Mon, 02 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wren-lang
Wren-lang wren
Vendors & Products Wren-lang
Wren-lang wren

Sun, 01 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T19:35:15.992Z

Reserved: 2026-02-28T14:49:59.570Z

Link: CVE-2026-3387

cve-icon Vulnrichment

Updated: 2026-03-02T19:35:12.607Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-01T10:16:00.863

Modified: 2026-03-05T01:50:58.183

Link: CVE-2026-3387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:00:15Z

Weaknesses