A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/0122/blob/main/i1219/repro | Exploit |
| https://github.com/wren-lang/wren/ | Product |
| https://github.com/wren-lang/wren/issues/1219 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.348272 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348272 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.761306 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 01:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wren wren
Wren |
|
| CPE | cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/oneafter/0122/blob/main/i1219/repro - Exploit | |
| References | () https://github.com/wren-lang/wren/ - Product | |
| References | () https://github.com/wren-lang/wren/issues/1219 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.348272 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348272 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.761306 - Third Party Advisory, VDB Entry |
01 Mar 2026, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-01 09:15
Updated : 2026-03-05 01:53
NVD link : CVE-2026-3386
Mitre link : CVE-2026-3386
CVE.ORG link : CVE-2026-3386
JSON object : View
Products Affected
wren
- wren
