Impact
Luanti, an open-source voxel game creation platform, contains a flaw that allows a malicious mod to escape the sandboxed Lua environment. The vulnerability enables arbitrary code execution and full file‑system access on the host. It is rooted in sandbox escape (CWE‑749) and executable code injection (CWE‑94).
Affected Systems
The affected vendor is luanti‑org and the product is Luanti. All releases from version 5.0.0 up to, but not including, 5.15.2 are impacted when LuaJIT is used, on both server‑side and client‑side environments.
Risk and Exploitability
The CVSS score of 9 indicates a high severity flaw, yet the EPSS score is less than 1 percent and it is not listed in the CISA KEV catalog, suggesting a low current exploitation probability. Attackers would need to deploy a malicious mod—typically by uploading or installing it in a trusted directory—while LuaJIT is active. Once patched, the risk is eliminated for all users of the affected versions.
OpenCVE Enrichment