Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3382: Memory Corruption in ChaiScript

0
Medium
VulnerabilityCVE-2026-3382cvecve-2026-3382
Published: Sun Mar 01 2026 (03/01/2026, 05:32:12 UTC)
Source: CVE Database V5
Product: ChaiScript

Description

A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 00:53:06 UTC

Technical Analysis

CVE-2026-3382 identifies a memory corruption vulnerability in the ChaiScript scripting engine, specifically in the get_as function of the Boxed_Number class within the dispatchkit component. ChaiScript is an embedded scripting language used in C++ applications to provide runtime scripting capabilities. The vulnerability arises from improper handling of data within get_as, which can lead to memory corruption when manipulated by a local attacker. The affected versions include 6.0 and 6.1.0. Exploitation requires local access with limited privileges but does not require user interaction or elevated authentication. The flaw could potentially allow an attacker to cause application crashes or execute arbitrary code depending on the context, though no confirmed exploits in the wild have been reported. The vulnerability was responsibly disclosed but remains unpatched as of the publication date. The CVSS 4.0 score of 4.8 reflects the medium severity, considering the local attack vector and limited impact scope. Since ChaiScript is embedded in various software products, the risk depends on the deployment context and exposure of local users to untrusted code execution.

Potential Impact

The primary impact of CVE-2026-3382 is the potential for memory corruption within applications embedding vulnerable versions of ChaiScript. This can lead to application instability, crashes, or potentially arbitrary code execution if exploited successfully. Organizations that embed ChaiScript in software exposed to local users or untrusted environments face increased risk. Attackers with local access could leverage this vulnerability to escalate privileges or disrupt critical services. While remote exploitation is not feasible, insider threats or compromised local accounts could exploit this flaw. The impact is particularly significant in development environments, embedded systems, or software tools that rely on ChaiScript for scripting and allow local user interaction. The lack of a patch and public exploit availability increases the urgency for mitigation. However, the medium CVSS score indicates the threat is moderate and manageable with proper controls.

Mitigation Recommendations

1. Restrict local access to systems running applications embedding ChaiScript, limiting untrusted user accounts and enforcing strict access controls. 2. Monitor and audit local user activities to detect suspicious attempts to invoke or manipulate ChaiScript scripting interfaces. 3. Employ application sandboxing or containerization to isolate the scripting engine and limit the impact of potential exploitation. 4. Disable or remove scripting features in ChaiScript if not required by the application to reduce the attack surface. 5. Follow the ChaiScript project and related software vendors for updates and apply patches promptly once available. 6. Conduct code reviews and static analysis on applications embedding ChaiScript to identify unsafe usage patterns of the get_as function or related components. 7. Implement runtime protections such as memory corruption detection tools (e.g., ASLR, DEP, or similar) to mitigate exploitation attempts. 8. Educate local users and administrators about the risks of executing untrusted scripts or code within affected environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T14:23:15.512Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a3d17732ffcdb8a2ed6d85

Added to database: 3/1/2026, 5:41:11 AM

Last enriched: 3/9/2026, 12:53:06 AM

Last updated: 4/15/2026, 12:46:42 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses