Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24809: CWE-787 Out-of-bounds Write in praydog REFramework

0
Medium
VulnerabilityCVE-2026-24809cvecve-2026-24809cwe-787
Published: Tue Jan 27 2026 (01/27/2026, 08:46:04 UTC)
Source: CVE Database V5
Vendor/Project: praydog
Product: REFramework

Description

An issue from the component luaG_runerror in dependencies/lua/src/ldebug.c in praydog/REFramework version before 1.5.5 leads to a heap-buffer overflow when a recursive error occurs.

AI-Powered Analysis

AILast updated: 01/27/2026, 09:22:38 UTC

Technical Analysis

CVE-2026-24809 is a heap-buffer overflow vulnerability classified under CWE-787, found in the praydog REFramework, specifically in the luaG_runerror function within the lua debugging source file ldebug.c. This vulnerability occurs when a recursive error triggers an out-of-bounds write on the heap, leading to memory corruption. The affected versions are all prior to 1.5.5, with the issue stemming from improper bounds checking during error handling in the Lua interpreter embedded in the framework. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), no confidentiality or integrity impact, but high availability impact (VA:H), and requires local user authentication (AU:Y). The vulnerability can cause denial of service or potentially enable code execution in the context of the local user, though exploitation complexity and scope are limited. No public exploits or patches are currently available, but the vulnerability is published and recognized by GovTech CSG. The REFramework is used primarily in automation and modding contexts, often by developers or advanced users, which limits the exposure to local environments.

Potential Impact

For European organizations, the primary impact of CVE-2026-24809 lies in potential denial of service or local code execution on systems running vulnerable versions of praydog REFramework. This could disrupt development pipelines, automation tasks, or modding environments, leading to productivity loss or localized system compromise. Since exploitation requires local access and no network vector is present, remote attacks are unlikely, reducing the risk to enterprise-wide infrastructure. However, insider threats or compromised local accounts could leverage this vulnerability to escalate privileges or destabilize critical development environments. Organizations relying on praydog REFramework for automation or software development, particularly in sectors like gaming, software engineering, or industrial automation, may face operational disruptions. The absence of known exploits and patches currently limits immediate risk but necessitates proactive mitigation to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-24809, organizations should prioritize upgrading praydog REFramework to version 1.5.5 or later once the patch is released. Until then, restrict local access to systems running the vulnerable framework to trusted users only and enforce strict access controls. Implement monitoring for unusual application crashes or error recursion patterns that could indicate exploitation attempts. Employ application whitelisting and sandboxing to limit the impact of potential memory corruption. Conduct code reviews and static analysis on Lua scripts used within the framework to detect recursive error conditions. Educate developers and system administrators about the vulnerability and the importance of applying updates promptly. Additionally, maintain up-to-date backups and incident response plans to quickly recover from any denial of service or compromise resulting from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-01-27T08:39:10.281Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69787ff54623b1157c11b674

Added to database: 1/27/2026, 9:05:57 AM

Last enriched: 1/27/2026, 9:22:38 AM

Last updated: 2/7/2026, 12:42:14 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats