Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2240: Out-of-Bounds Read in janet-lang janet

0
Medium
VulnerabilityCVE-2026-2240cvecve-2026-2240
Published: Mon Feb 09 2026 (02/09/2026, 15:32:10 UTC)
Source: CVE Database V5
Vendor/Project: janet-lang
Product: janet

Description

A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The name of the patch is 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. A patch should be applied to remediate this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:12:58 UTC

Technical Analysis

CVE-2026-2240 is a security vulnerability discovered in the janet-lang janet interpreter, affecting versions 1.40.0 and 1.40.1. The vulnerability resides in the janetc_pop_funcdef function located in the src/core/compile.c source file. It results in an out-of-bounds read condition, where the program reads memory outside the allocated buffer boundaries. This can occur due to improper handling of function definitions during compilation or bytecode processing. The vulnerability requires local access with limited privileges (PR:L) and does not require user interaction or elevated privileges. The attack vector is local, meaning an attacker must have access to the system where janet is installed. The CVSS v4.0 base score is 4.8, reflecting medium severity, with low attack complexity and no user interaction needed. The impact primarily concerns confidentiality, as out-of-bounds reads can leak sensitive memory contents, potentially exposing secrets or internal data structures. The vulnerability does not directly allow code execution or privilege escalation but may be leveraged in chained attacks. The patch identified by commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5 fixes the issue by correcting the bounds checking logic in the affected function. No public exploits are known at this time, but the vulnerability has been publicly disclosed, increasing the risk of future exploitation. Organizations using janet-lang, especially in environments where local users have access, should apply the patch to prevent potential information disclosure.

Potential Impact

The primary impact of CVE-2026-2240 is unauthorized disclosure of memory contents due to out-of-bounds reads. This can lead to leakage of sensitive information such as cryptographic keys, passwords, or internal program data, undermining confidentiality. While the vulnerability does not allow remote exploitation or privilege escalation, it poses a risk in multi-user environments or systems where untrusted local users have access. Attackers could use this flaw to gather intelligence for further attacks or to bypass security controls relying on memory confidentiality. The medium severity rating reflects the limited attack vector and moderate impact. However, in environments where janet-lang is used for critical scripting or automation, this vulnerability could compromise operational security. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially after public disclosure. Organizations with janet-lang installations should consider the risk of insider threats or compromised local accounts exploiting this vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-2240, organizations should promptly apply the official patch identified by commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5 to all affected janet-lang versions (1.40.0 and 1.40.1). Additionally, restrict local access to systems running janet-lang to trusted users only, minimizing the risk of exploitation by unprivileged attackers. Implement strict access controls and monitoring on systems where janet is installed, especially in shared or multi-user environments. Consider using sandboxing or containerization to isolate janet-lang processes and limit potential memory exposure. Regularly audit and update janet-lang installations to the latest secure versions. If patching is not immediately feasible, monitor system logs for unusual activity and limit the execution of untrusted scripts. Educate developers and system administrators about the vulnerability and the importance of applying security updates. Finally, incorporate janet-lang vulnerability scanning into routine security assessments to detect outdated versions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-09T09:38:25.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a04d04b57a58fa15c44d9

Added to database: 2/9/2026, 4:01:20 PM

Last enriched: 2/23/2026, 9:12:58 PM

Last updated: 3/26/2026, 9:47:38 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses