CVE-2026-30960
RSSN has Arbitrary Code Execution via Unvalidated JIT Instruction Generation in C-FFI Interface
rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.
| CWE | CWE-94 CWE-269 CWE-695 CWE-754 |
| Vendor | apich-organization |
| Product | rssn |
| Published | Mar 10, 2026 |
| Last Updated | Mar 10, 2026 |
Get instant alerts for apich-organization rssn
Be the first to know when new unknown vulnerabilities affecting apich-organization rssn are published โ delivered to Slack, Telegram or Discord.