CVE-2026-3382

LOW

ChaiScript <=6.1.0 - Memory Corruption

Title source: llm
STIX 2.1

Description

A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

References (6)

Core 6
Core References
Permissions Required, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.348268
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.348268
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.761301

Scores

CVSS v3 3.3
EPSS 0.0001
EPSS Percentile 0.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-119 CWE-787
Status published
Products (3)
None/ChaiScript 6.0
None/ChaiScript 6.1.0
chaiscript/chaiscript < 6.1.0
Published Mar 01, 2026
Tracked Since Mar 01, 2026