Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3385
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-01 Mar, 2026 | 08:32
Updated At-01 Mar, 2026 | 08:32
Rejected At-
▼CVE Numbering Authority (CNA)
wren-lang wren wren_compiler.c resolveLocal recursion

A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected Products
Vendor
wren-lang
Product
wren
Versions
Affected
  • 0.1
  • 0.2
  • 0.3
  • 0.4.0
Problem Types
TypeCWE IDDescription
CWECWE-674Uncontrolled Recursion
CWECWE-404Denial of Service
Type: CWE
CWE ID: CWE-674
Description: Uncontrolled Recursion
Type: CWE
CWE ID: CWE-404
Description: Denial of Service
Metrics
VersionBase scoreBase severityVector
4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3.03.3LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2.01.7N/A
AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Version: 3.0
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Version: 2.0
Base score: 1.7
Base severity: N/A
Vector:
AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Oneafter (VulDB User)
Timeline
EventDate
Advisory disclosed2026-02-28 00:00:00
VulDB entry created2026-02-28 01:00:00
VulDB entry last update2026-02-28 15:55:04
Event: Advisory disclosed
Date: 2026-02-28 00:00:00
Event: VulDB entry created
Date: 2026-02-28 01:00:00
Event: VulDB entry last update
Date: 2026-02-28 15:55:04
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.348271
vdb-entry
technical-description
https://vuldb.com/?ctiid.348271
signature
permissions-required
https://vuldb.com/?submit.761305
third-party-advisory
https://github.com/wren-lang/wren/issues/1218
issue-tracking
https://github.com/oneafter/0122/blob/main/i1218/repro
exploit
https://github.com/wren-lang/wren/
product
Hyperlink: https://vuldb.com/?id.348271
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/?ctiid.348271
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.761305
Resource:
third-party-advisory
Hyperlink: https://github.com/wren-lang/wren/issues/1218
Resource:
issue-tracking
Hyperlink: https://github.com/oneafter/0122/blob/main/i1218/repro
Resource:
exploit
Hyperlink: https://github.com/wren-lang/wren/
Resource:
product
Details not found