๐Ÿ” CVE Alert

CVE-2025-12875

MEDIUM 5.3

mruby array.c ary_fill_exec out-of-bounds write

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in mruby 3.4.0. This vulnerability affects the function ary_fill_exec of the file mrbgems/mruby-array-ext/src/array.c. Executing a manipulation of the argument start/length can lead to out-of-bounds write. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 93619f06dd378db6766666b30c08978311c7ec94. It is best practice to apply a patch to resolve this issue.

CWE CWE-787 CWE-119
Vendor n/a
Product mruby
Published Nov 7, 2025
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for n/a mruby

Be the first to know when new medium vulnerabilities affecting n/a mruby are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / mruby
3.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.331511 vuldb.com: https://vuldb.com/?ctiid.331511 vuldb.com: https://vuldb.com/?submit.680879 github.com: https://github.com/mruby/mruby/issues/6650 github.com: https://github.com/mruby/mruby/issues/6650#event-20443453808 github.com: https://github.com/mruby/mruby/issues/6650#issuecomment-3430851605 github.com: https://github.com/makesoftwaresafe/mruby/commit/93619f06dd378db6766666b30c08978311c7ec94 github.com: https://github.com/mruby/mruby/

Credits

๐Ÿ” tjbecker (VulDB User)