CVE-2026-2655
ChaiScript chaiscript_defines.hpp operator use after free
CVSS Score
2.5
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-416 CWE-119 |
| Vendor | n/a |
| Product | chaiscript |
| Published | Feb 18, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a chaiscript
Be the first to know when new low vulnerabilities affecting n/a chaiscript are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / ChaiScript
6.0 6.1.0
References
vuldb.com: https://vuldb.com/?id.346453 vuldb.com: https://vuldb.com/?ctiid.346453 vuldb.com: https://vuldb.com/?submit.752788 github.com: https://github.com/ChaiScript/ChaiScript/issues/632 github.com: https://github.com/ChaiScript/ChaiScript/issues/632#issue-3827824936 github.com: https://github.com/ChaiScript/ChaiScript/
Credits
๐ Oneafter (VulDB User)