A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/0122/blob/main/i1220/repro | Exploit |
| https://github.com/wren-lang/wren/ | Product |
| https://github.com/wren-lang/wren/issues/1220 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.348273 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348273 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.761312 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 01:50
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Wren wren
Wren |
|
| CPE | cpe:2.3:a:wren:wren:*:*:*:*:*:*:*:* | |
| References | () https://github.com/oneafter/0122/blob/main/i1220/repro - Exploit | |
| References | () https://github.com/wren-lang/wren/ - Product | |
| References | () https://github.com/wren-lang/wren/issues/1220 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.348273 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348273 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.761312 - Third Party Advisory, VDB Entry |
01 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-01 10:16
Updated : 2026-03-05 01:50
NVD link : CVE-2026-3387
Mitre link : CVE-2026-3387
CVE.ORG link : CVE-2026-3387
JSON object : View
Products Affected
wren
- wren
