CVE-2026-3384: Uncontrolled Recursion in ChaiScript
A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-3384 identifies a vulnerability in the ChaiScript scripting engine, specifically affecting versions 6.0 and 6.1.0. The issue arises from uncontrolled recursion within the evaluation functions chaiscript::eval::AST_Node_Impl::eval and Function_Push_Pop located in the chaiscript_eval.hpp source file. When malicious or malformed input is processed, these functions can enter an infinite or excessively deep recursive loop, leading to stack overflow or resource exhaustion. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated privileges. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.8 score reflects a medium severity, primarily due to the limited attack vector and privileges required. The vulnerability can cause denial of service by crashing the host application or degrading its performance. The ChaiScript project was notified early but has not yet released a patch or official fix. No known exploits have been reported in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability affects any software embedding ChaiScript for scripting, which may include automation tools, embedded systems, or applications requiring runtime script evaluation. Without mitigation, attackers with local access could disrupt services or cause application instability.
Potential Impact
The primary impact of CVE-2026-3384 is denial of service through uncontrolled recursion leading to application crashes or resource exhaustion. Organizations embedding ChaiScript in their software may experience instability or outages if exploited locally. While the vulnerability does not allow privilege escalation or remote code execution, the denial of service can disrupt critical workflows, especially in environments relying on scripting for automation or customization. This could affect development environments, embedded devices, or software platforms that use ChaiScript internally. The limited attack vector (local access) reduces the overall risk but does not eliminate it, particularly in multi-user systems or environments where local access is easier to obtain. The absence of a patch increases exposure time, and public disclosure may motivate attackers to develop exploits. Organizations may face operational disruptions and potential reputational damage if the vulnerability is exploited in production systems.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Restrict local access to systems running software with embedded ChaiScript to trusted users only. 2) Employ application-level input validation to detect and prevent malicious or malformed scripts that could trigger recursion. 3) Configure or modify the ChaiScript environment, if possible, to limit recursion depth or execution time to prevent infinite loops. 4) Use sandboxing or containerization to isolate script execution and limit resource consumption. 5) Monitor application logs and system metrics for signs of excessive recursion or resource exhaustion. 6) Engage with the ChaiScript community or maintainers to track patch releases and apply updates promptly once available. 7) Consider alternative scripting engines if immediate mitigation is not feasible and the risk is unacceptable. These steps go beyond generic advice by focusing on controlling script input, limiting recursion, and isolating execution environments.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Japan, South Korea, China, India, Australia
CVE-2026-3384: Uncontrolled Recursion in ChaiScript
Description
A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
CVE-2026-3384 identifies a vulnerability in the ChaiScript scripting engine, specifically affecting versions 6.0 and 6.1.0. The issue arises from uncontrolled recursion within the evaluation functions chaiscript::eval::AST_Node_Impl::eval and Function_Push_Pop located in the chaiscript_eval.hpp source file. When malicious or malformed input is processed, these functions can enter an infinite or excessively deep recursive loop, leading to stack overflow or resource exhaustion. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated privileges. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.8 score reflects a medium severity, primarily due to the limited attack vector and privileges required. The vulnerability can cause denial of service by crashing the host application or degrading its performance. The ChaiScript project was notified early but has not yet released a patch or official fix. No known exploits have been reported in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability affects any software embedding ChaiScript for scripting, which may include automation tools, embedded systems, or applications requiring runtime script evaluation. Without mitigation, attackers with local access could disrupt services or cause application instability.
Potential Impact
The primary impact of CVE-2026-3384 is denial of service through uncontrolled recursion leading to application crashes or resource exhaustion. Organizations embedding ChaiScript in their software may experience instability or outages if exploited locally. While the vulnerability does not allow privilege escalation or remote code execution, the denial of service can disrupt critical workflows, especially in environments relying on scripting for automation or customization. This could affect development environments, embedded devices, or software platforms that use ChaiScript internally. The limited attack vector (local access) reduces the overall risk but does not eliminate it, particularly in multi-user systems or environments where local access is easier to obtain. The absence of a patch increases exposure time, and public disclosure may motivate attackers to develop exploits. Organizations may face operational disruptions and potential reputational damage if the vulnerability is exploited in production systems.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Restrict local access to systems running software with embedded ChaiScript to trusted users only. 2) Employ application-level input validation to detect and prevent malicious or malformed scripts that could trigger recursion. 3) Configure or modify the ChaiScript environment, if possible, to limit recursion depth or execution time to prevent infinite loops. 4) Use sandboxing or containerization to isolate script execution and limit resource consumption. 5) Monitor application logs and system metrics for signs of excessive recursion or resource exhaustion. 6) Engage with the ChaiScript community or maintainers to track patch releases and apply updates promptly once available. 7) Consider alternative scripting engines if immediate mitigation is not feasible and the risk is unacceptable. These steps go beyond generic advice by focusing on controlling script input, limiting recursion, and isolating execution environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-28T14:23:22.407Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a3f82232ffcdb8a20b78ab
Added to database: 3/1/2026, 8:26:10 AM
Last enriched: 3/1/2026, 8:40:24 AM
Last updated: 3/2/2026, 6:42:03 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3422: CWE-502 Deserialization of Untrusted Data in e-Excellence U-Office Force
CriticalCVE-2026-3413: SQL Injection in itsourcecode University Management System
MediumCVE-2026-3000: CWE-494 Download of Code Without Integrity Check in Changing IDExpert Windows Logon Agent
CriticalCVE-2026-2999: CWE-494 Download of Code Without Integrity Check in Changing IDExpert Windows Logon Agent
CriticalCVE-2025-15597: Improper Access Controls in Dataease SQLBot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.