A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/0122/blob/main/i1217/repro | Issue Tracking Product |
| https://github.com/wren-lang/wren/ | Product |
| https://github.com/wren-lang/wren/issues/1217 | Issue Tracking |
| https://vuldb.com/?ctiid.347097 | Permissions Required VDB Entry |
| https://vuldb.com/?id.347097 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.754489 | Third Party Advisory VDB Entry |
Configurations
History
26 Feb 2026, 02:35
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:* | |
| First Time |
Wren wren
Wren |
|
| References | () https://github.com/oneafter/0122/blob/main/i1217/repro - Issue Tracking, Product | |
| References | () https://github.com/wren-lang/wren/ - Product | |
| References | () https://github.com/wren-lang/wren/issues/1217 - Issue Tracking | |
| References | () https://vuldb.com/?ctiid.347097 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.347097 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.754489 - Third Party Advisory, VDB Entry |
20 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 22:16
Updated : 2026-02-26 02:35
NVD link : CVE-2026-2858
Mitre link : CVE-2026-2858
CVE.ORG link : CVE-2026-2858
JSON object : View
Products Affected
wren
- wren
