CVE-2026-33491

HIGH

Zen C < 0.4.4 - Stack Buffer Overflow in Identifier Mangling

Title source: manual
STIX 2.1

Description

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-121 CWE-787
Status published
Products (2)
z-libs/zen_c < 0.4.4
zenc-lang/zenc < 0.4.4
Published Mar 26, 2026
Tracked Since Mar 27, 2026