CVE-2026-33491
HIGHZen C < 0.4.4 - Stack Buffer Overflow in Identifier Mangling
Title source: manualDescription
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-121
CWE-787
Status
published
Products (2)
z-libs/zen_c
< 0.4.4
zenc-lang/zenc
< 0.4.4
Published
Mar 26, 2026
Tracked Since
Mar 27, 2026