CVE-2026-8295
Integer overflow in simdjson
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An integer overflow vulnerability in the simdjson document-builder API allows incorrect buffer size calculations in "string_builder::escape_and_append()" when processing very large input strings on platforms with limited "size_t" width (e.g., 32-bit builds). The overflow can cause insufficient buffer allocation, leading to out-of-bounds memory reads in SIMD routines and potentially resulting in information disclosure, memory corruption, or malformed JSON output. This vulnerability has been fixed in 4.6.4 release
| CWE | CWE-190 |
| Vendor | simdjson |
| Product | simdjson |
| Published | May 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for simdjson simdjson
Be the first to know when new unknown vulnerabilities affecting simdjson simdjson are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
simdjson / simdjson
0 < 4.6.4
References
Credits
Michał Majchrowicz (AFINE) Marcin Wyczechowski (AFINE)