Description
editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.
Published: 2026-04-18
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow in the ec_glob() function of the editorconfig-core-c library. The function fails to protect the l_pattern[8194] stack buffer, resulting in a stack corruption when a specially crafted directory structure and .editorconfig file are parsed. This flaw can crash any application that links libeditorconfig, provoking a SIGABRT on systems such as Ubuntu 24.04 and leading to a denial of service. Although no arbitrary code execution is reported, the defect is a classic stack-based buffer overflow (CWE-121) and an out-of-bounds write on a stack buffer (CWE-787). The issue is an incomplete fix for CVE-2023-0341 and was addressed in release 0.12.11.

Affected Systems

The affected product is editorconfig-core-c, a core library used by plugins and applications that need EditorConfig parsing. All releases up to and including 0.12.10 are vulnerable. The library is referenced by vendor editorconfig:editorconfig-core-c. Software that statically or dynamically links libeditorconfig, such as integrated development environments, code editors, or build tools that support EditorConfig, may be impacted if they use a vulnerable library version. The fix is included in version 0.12.11; upgrading to that or later resolves the issue.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability. Based on the description, it is inferred that the attack vector is local or remote if the application processes untrusted configuration files, allowing an attacker to supply a malformed .editorconfig file to trigger the overflow. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet. However, the high CVSS and the nature of the stack overflow create a strong risk of denial of service in affected systems that process untrusted configuration data. The attack does not provide arbitrary code execution but can disrupt availability of the affected application.

Generated by OpenCVE AI on April 18, 2026 at 17:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update libeditorconfig to version 0.12.11 or later to apply the vendor fix.
  • If an immediate upgrade is not possible, configure the application or file system to inhibit processing of .editorconfig files from untrusted directories, such as removing those directories from the configuration search path or setting restrictive permissions.
  • Monitor logs for abnormal crashes or SIGABRT events; if detected, isolate the affected process or apply sandboxing to limit the impact of any potential overflow.

Generated by OpenCVE AI on April 18, 2026 at 17:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Editorconfig
Editorconfig editorconfig
Vendors & Products Editorconfig
Editorconfig editorconfig

Sat, 18 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.
Title editorconfig-core-c has incomplete fix for CVE-2023-0341
Weaknesses CWE-121
CWE-787
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Editorconfig Editorconfig
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T16:15:31.570Z

Reserved: 2026-04-13T19:50:42.114Z

Link: CVE-2026-40489

cve-icon Vulnrichment

Updated: 2026-04-20T16:10:37.295Z

cve-icon NVD

Status : Deferred

Published: 2026-04-18T02:16:11.827

Modified: 2026-04-20T18:59:16.353

Link: CVE-2026-40489

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:58:54Z

Weaknesses