Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3385: Uncontrolled Recursion in wren-lang wren

0
Medium
VulnerabilityCVE-2026-3385cvecve-2026-3385
Published: Sun Mar 01 2026 (03/01/2026, 08:32:09 UTC)
Source: CVE Database V5
Vendor/Project: wren-lang
Product: wren

Description

A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 01:20:48 UTC

Technical Analysis

CVE-2026-3385 is a vulnerability identified in the wren-lang wren interpreter, specifically affecting versions 0.1 through 0.4.0. The flaw exists in the resolveLocal function of the wren_compiler.c source file, where improper handling of recursion leads to uncontrolled recursive calls. This uncontrolled recursion can cause the program to enter an infinite loop or exhaust stack memory, resulting in a denial of service (DoS) condition. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction or authentication, making it exploitable by a local attacker with minimal permissions. The CVSS 4.0 vector indicates low attack complexity and no need for user interaction, but the attack surface is limited to local access only. The vulnerability was responsibly disclosed early to the project maintainers, but no patch or response has been issued as of the publication date. An exploit is publicly available, increasing the risk of local DoS attacks on systems running vulnerable versions of wren. The vulnerability does not appear to impact confidentiality or integrity directly but can disrupt availability by crashing or hanging the interpreter. Wren is a lightweight scripting language often embedded in applications or used for scripting, so the impact depends on the deployment context. Since the vulnerability affects the compiler component, it could impact development environments or embedded systems relying on wren for scripting capabilities.

Potential Impact

The primary impact of CVE-2026-3385 is denial of service through uncontrolled recursion leading to resource exhaustion. Organizations using wren-lang in development environments, embedded systems, or scripting engines may experience application crashes or system instability if an attacker with local access exploits this flaw. While the vulnerability does not allow privilege escalation or remote code execution, disruption of availability can affect development workflows or embedded device functionality. The requirement for local access limits the attack scope, reducing risk in environments with strong access controls. However, insider threats or compromised local accounts could leverage this vulnerability to cause service interruptions. The public availability of an exploit increases the likelihood of opportunistic attacks. Systems that embed wren in critical infrastructure or IoT devices may face operational risks if exploited. Overall, the impact is moderate but could be significant in environments where wren is integral to system operation or automation.

Mitigation Recommendations

To mitigate CVE-2026-3385, organizations should first identify all instances of wren-lang wren versions 0.1 through 0.4.0 in their environments. Since no official patch is currently available, consider the following steps: 1) Restrict local access to systems running wren to trusted users only, minimizing the risk of local exploitation. 2) Implement strict access controls and monitoring to detect unusual local activity that could indicate exploitation attempts. 3) If feasible, replace or upgrade wren-lang with a version that addresses this vulnerability once released. 4) For embedded systems, consider disabling or sandboxing scripting capabilities that invoke wren to limit exposure. 5) Review and harden development and deployment processes to prevent untrusted code execution within wren environments. 6) Monitor public advisories for updates or patches from the wren-lang project. 7) As a temporary workaround, developers may audit and modify the resolveLocal function to add recursion depth checks or safeguards against infinite recursion if source code access and expertise are available. These targeted mitigations go beyond generic advice by focusing on local access restrictions, code auditing, and environment hardening specific to wren usage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T14:49:52.976Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a3ff2a32ffcdb8a20f9a64

Added to database: 3/1/2026, 8:56:10 AM

Last enriched: 3/9/2026, 1:20:48 AM

Last updated: 4/17/2026, 8:43:13 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses