No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wren-lang
Wren-lang wren |
|
| Vendors & Products |
Wren-lang
Wren-lang wren |
Fri, 20 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in wren-lang wren up to 0.4.0. This affects the function peekChar of the file src/vm/wren_compiler.c of the component Source File Parser. Such manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | wren-lang wren Source File wren_compiler.c peekChar out-of-bounds | |
| Weaknesses | CWE-119 CWE-125 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T14:50:28.182Z
Reserved: 2026-02-20T10:49:27.958Z
Link: CVE-2026-2858
No data.
Status : Awaiting Analysis
Published: 2026-02-20T22:16:30.000
Modified: 2026-02-23T18:14:13.887
Link: CVE-2026-2858
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:35:00Z