Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2887: Uncontrolled Recursion in aardappel lobster

0
Medium
VulnerabilityCVE-2026-2887cvecve-2026-2887
Published: Sat Feb 21 2026 (02/21/2026, 21:02:16 UTC)
Source: CVE Database V5
Vendor/Project: aardappel
Product: lobster

Description

A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the function lobster::TypeName in the library dev/src/lobster/idents.h. Such manipulation leads to uncontrolled recursion. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2026.1 will fix this issue. The name of the patch is 8ba49f98ccfc9734ef352146806433a41d9f9aa6. It is advisable to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:15:51 UTC

Technical Analysis

CVE-2026-2887 identifies a vulnerability in the aardappel lobster library, specifically in the lobster::TypeName function located in dev/src/lobster/idents.h. The flaw is caused by uncontrolled recursion triggered by crafted inputs or conditions within this function, leading to potential stack overflow or denial of service through resource exhaustion. The recursion is not properly bounded, allowing an attacker with local access and low privileges to induce this behavior. The vulnerability affects all versions up to 2025.4 and has been publicly disclosed, although no active exploitation has been reported. The vulnerability does not require user interaction and does not compromise confidentiality or integrity directly but impacts availability by causing application instability or crashes. The patch identified by commit 8ba49f98ccfc9734ef352146806433a41d9f9aa6 addresses this issue and is included in version 2026.1 of the lobster library. The CVSS 4.0 base score is 4.8, reflecting a medium severity level due to the local attack vector and limited impact scope. Organizations using this library in development or runtime environments should prioritize upgrading to the fixed version to prevent potential denial of service scenarios.

Potential Impact

The primary impact of CVE-2026-2887 is on system availability. By exploiting uncontrolled recursion, an attacker with local access can cause the affected application or service to crash or become unresponsive, leading to denial of service conditions. This can disrupt development workflows or runtime operations relying on the lobster library. While the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting instability can affect dependent systems and services, potentially causing downtime or degraded performance. Organizations with critical systems using the affected versions may face operational disruptions, increased support costs, and potential reputational damage if service availability is impacted. Since exploitation requires local access, the threat is more relevant in environments where multiple users share access or where attackers have already gained limited footholds. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

To mitigate CVE-2026-2887, organizations should upgrade the aardappel lobster library to version 2026.1 or later, which contains the patch fixing the uncontrolled recursion issue. Until the upgrade can be applied, restrict local access to systems running affected versions to trusted users only, minimizing the risk of exploitation. Implement monitoring for application crashes or unusual resource consumption patterns that may indicate attempted exploitation. Conduct code reviews and testing to identify any custom code invoking lobster::TypeName that might be vulnerable to crafted inputs. Employ runtime protections such as stack depth limits or recursion guards if supported by the environment. Additionally, maintain strict access controls and audit logs to detect and respond to unauthorized local access attempts. Regularly update and patch development and runtime environments to reduce exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T17:07:30.695Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a20dabe58cf853b48d564

Added to database: 2/21/2026, 9:17:14 PM

Last enriched: 3/1/2026, 6:15:51 AM

Last updated: 4/8/2026, 10:50:31 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses