๐Ÿ” CVE Alert

CVE-2026-0708

HIGH 8.3

Libucl: libucl: denial of service via embedded null byte in ucl input

CVSS Score
8.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

CWE CWE-125
Vendor libucl
Product libucl
Published Mar 17, 2026
Last Updated Mar 17, 2026
Stay Ahead of the Next One

Get instant alerts for libucl libucl

Be the first to know when new high vulnerabilities affecting libucl libucl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High

Affected Versions

libucl / libucl
3e7f023e184e06f30fb5792dacd9dd0f8b692f1b

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2026-0708 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2427770 github.com: https://github.com/vstakhov/libucl/issues/323