Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3384: Uncontrolled Recursion in ChaiScript

0
Medium
VulnerabilityCVE-2026-3384cvecve-2026-3384
Published: Sun Mar 01 2026 (03/01/2026, 08:02:08 UTC)
Source: CVE Database V5
Product: ChaiScript

Description

A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 03/01/2026, 08:40:24 UTC

Technical Analysis

CVE-2026-3384 identifies a vulnerability in the ChaiScript scripting engine, specifically affecting versions 6.0 and 6.1.0. The issue arises from uncontrolled recursion within the evaluation functions chaiscript::eval::AST_Node_Impl::eval and Function_Push_Pop located in the chaiscript_eval.hpp source file. When malicious or malformed input is processed, these functions can enter an infinite or excessively deep recursive loop, leading to stack overflow or resource exhaustion. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated privileges. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.8 score reflects a medium severity, primarily due to the limited attack vector and privileges required. The vulnerability can cause denial of service by crashing the host application or degrading its performance. The ChaiScript project was notified early but has not yet released a patch or official fix. No known exploits have been reported in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability affects any software embedding ChaiScript for scripting, which may include automation tools, embedded systems, or applications requiring runtime script evaluation. Without mitigation, attackers with local access could disrupt services or cause application instability.

Potential Impact

The primary impact of CVE-2026-3384 is denial of service through uncontrolled recursion leading to application crashes or resource exhaustion. Organizations embedding ChaiScript in their software may experience instability or outages if exploited locally. While the vulnerability does not allow privilege escalation or remote code execution, the denial of service can disrupt critical workflows, especially in environments relying on scripting for automation or customization. This could affect development environments, embedded devices, or software platforms that use ChaiScript internally. The limited attack vector (local access) reduces the overall risk but does not eliminate it, particularly in multi-user systems or environments where local access is easier to obtain. The absence of a patch increases exposure time, and public disclosure may motivate attackers to develop exploits. Organizations may face operational disruptions and potential reputational damage if the vulnerability is exploited in production systems.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict local access to systems running software with embedded ChaiScript to trusted users only. 2) Employ application-level input validation to detect and prevent malicious or malformed scripts that could trigger recursion. 3) Configure or modify the ChaiScript environment, if possible, to limit recursion depth or execution time to prevent infinite loops. 4) Use sandboxing or containerization to isolate script execution and limit resource consumption. 5) Monitor application logs and system metrics for signs of excessive recursion or resource exhaustion. 6) Engage with the ChaiScript community or maintainers to track patch releases and apply updates promptly once available. 7) Consider alternative scripting engines if immediate mitigation is not feasible and the risk is unacceptable. These steps go beyond generic advice by focusing on controlling script input, limiting recursion, and isolating execution environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T14:23:22.407Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a3f82232ffcdb8a20b78ab

Added to database: 3/1/2026, 8:26:10 AM

Last enriched: 3/1/2026, 8:40:24 AM

Last updated: 3/2/2026, 6:42:03 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses