CVE-2026-2659

A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument _target_stack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/albertodemichelis/squirrel/issues/311 Exploit Issue Tracking
https://github.com/oneafter/0122/blob/main/i311/repro Exploit
https://vuldb.com/?ctiid.346457 Permissions Required VDB Entry
https://vuldb.com/?id.346457 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753163 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:squirrel-lang:squirrel:*:*:*:*:*:*:*:*

History

20 Feb 2026, 20:05

Type Values Removed Values Added
First Time Squirrel-lang
Squirrel-lang squirrel
References () https://github.com/albertodemichelis/squirrel/issues/311 - () https://github.com/albertodemichelis/squirrel/issues/311 - Exploit, Issue Tracking
References () https://github.com/oneafter/0122/blob/main/i311/repro - () https://github.com/oneafter/0122/blob/main/i311/repro - Exploit
References () https://vuldb.com/?ctiid.346457 - () https://vuldb.com/?ctiid.346457 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346457 - () https://vuldb.com/?id.346457 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.753163 - () https://vuldb.com/?submit.753163 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:squirrel-lang:squirrel:*:*:*:*:*:*:*:*
Summary
  • (es) Se encontró una vulnerabilidad en Squirrel hasta la versión 3.2. Está afectada por esta vulnerabilidad la función SQFuncState::PopTarget del archivo src/squirrel/squirrel/sqfuncstate.cpp. Si se manipula el argumento _target_stack puede lograrse una lectura fuera de límites. Es posible lanzar el ataque en el host local. El exploit ha sido divulgado públicamente y puede ser utilizado. Se informó pronto del problema al proyecto a través de un informe de incidencias pero aún no ha respondido.

18 Feb 2026, 18:24

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 18:24

Updated : 2026-02-20 20:05


NVD link : CVE-2026-2659

Mitre link : CVE-2026-2659

CVE.ORG link : CVE-2026-2659


JSON object : View

Products Affected

squirrel-lang

  • squirrel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read