Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2660: Use After Free in FascinatedBox lily

0
Medium
VulnerabilityCVE-2026-2660cvecve-2026-2660
Published: Wed Feb 18 2026 (02/18/2026, 18:02:07 UTC)
Source: CVE Database V5
Vendor/Project: FascinatedBox
Product: lily

Description

A vulnerability was identified in FascinatedBox lily up to 2.3. Affected by this issue is the function shorthash_for_name of the file src/lily_symtab.c. The manipulation leads to use after free. Local access is required to approach this attack. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:36:35 UTC

Technical Analysis

CVE-2026-2660 is a use-after-free vulnerability found in FascinatedBox lily, an open-source project, affecting versions 2.0 through 2.3. The flaw resides in the function shorthash_for_name within the source file src/lily_symtab.c. This function improperly manages memory, leading to a use-after-free condition when manipulating internal data structures. Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, which can result in undefined behavior such as memory corruption, crashes, or execution of arbitrary code. Exploitation requires the attacker to have local access with low privileges, and no user interaction is necessary. The vulnerability does not require elevated privileges or authentication beyond local access, making it accessible to any local user or process. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported. The vendor has been notified but has not yet issued a patch or response. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the local attack vector, low complexity, and lack of required user interaction. The vulnerability affects the confidentiality, integrity, and availability of systems running the affected versions of FascinatedBox lily, particularly in environments where local users or processes can execute code or access the application.

Potential Impact

The primary impact of CVE-2026-2660 is the potential for local attackers to exploit the use-after-free vulnerability to cause memory corruption, leading to application crashes or potentially arbitrary code execution. This can compromise the integrity and availability of systems running FascinatedBox lily. In multi-user or shared environments, an unprivileged local user could leverage this flaw to escalate privileges or disrupt services. Although remote exploitation is not possible, the presence of a public exploit increases the risk of insider threats or attackers who have gained limited local access. Organizations relying on FascinatedBox lily for critical operations may face service interruptions or data integrity issues. The lack of vendor response and patch availability prolongs exposure, increasing the window of risk. However, the medium severity and local access requirement limit the scope compared to remote or unauthenticated vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2026-2660, organizations should implement strict local access controls to limit who can execute or interact with FascinatedBox lily, reducing the risk of local exploitation. Employing mandatory access controls (e.g., SELinux, AppArmor) can further restrict the application's capabilities and isolate it from other system components. Monitoring and auditing local user activities can help detect attempts to exploit the vulnerability. Until an official patch is released, consider running FascinatedBox lily in a sandboxed or containerized environment to contain potential damage. Review and update system user permissions to minimize unnecessary local access. Additionally, maintain up-to-date backups and prepare incident response plans for potential exploitation scenarios. Once the vendor releases a patch, prioritize timely application to eliminate the vulnerability. Finally, keep abreast of any updates from the vendor or security community regarding this issue.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T07:25:33.125Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996fb498fb9188dea8c09a0

Added to database: 2/19/2026, 12:00:09 PM

Last enriched: 2/28/2026, 1:36:35 PM

Last updated: 4/7/2026, 2:23:26 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses