๐Ÿ” CVE Alert

CVE-2026-3387

LOW 3.3

wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereference

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-476 CWE-404
Vendor wren-lang
Product wren
Published Mar 1, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for wren-lang wren

Be the first to know when new low vulnerabilities affecting wren-lang wren are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wren-lang / wren
0.1 0.2 0.3 0.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.348273 vuldb.com: https://vuldb.com/?ctiid.348273 vuldb.com: https://vuldb.com/?submit.761312 github.com: https://github.com/wren-lang/wren/issues/1220 github.com: https://github.com/oneafter/0122/blob/main/i1220/repro github.com: https://github.com/wren-lang/wren/

Credits

๐Ÿ” Oneafter (VulDB User)