Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4833: Uncontrolled Recursion in Orc discount

0
Medium
VulnerabilityCVE-2026-4833cvecve-2026-4833
Published: Thu Mar 26 2026 (03/26/2026, 01:02:39 UTC)
Source: CVE Database V5
Vendor/Project: Orc
Product: discount

Description

A weakness has been identified in Orc discount up to 3.0.1.2. This issue affects the function compile of the file markdown.c of the component Markdown Handler. This manipulation causes uncontrolled recursion. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project maintainer confirms: "[I]f you feed it an infinitely deep blockquote input it will crash. (...) [T]his is a duplicate of an old bug that I've been working on."

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:35:02 UTC

Technical Analysis

CVE-2026-4833 identifies a vulnerability in the Orc discount markdown processor, versions 3.0.1.0 through 3.0.1.2. The vulnerability resides in the compile function of the markdown.c file, part of the Markdown Handler component. When processing markdown input, specifically blockquotes, the function can enter uncontrolled recursion if fed an infinitely deep blockquote structure. This recursive call stack growth leads to a crash, effectively a denial-of-service condition. The vulnerability requires local execution privileges and low complexity to exploit, as no authentication or user interaction is necessary beyond local access. The maintainer acknowledges this as a duplicate of an older bug, indicating a longstanding issue. Although the exploit has been publicly disclosed, there are no reports of active exploitation in the wild. The CVSS 4.0 base score is 4.8 (medium), reflecting limited impact scope and local attack vector. The flaw affects availability by crashing the application, potentially disrupting services that rely on Orc discount for markdown processing. No patches were linked at the time of disclosure, so mitigation may rely on input validation or limiting recursion depth until an official fix is released.

Potential Impact

The primary impact of CVE-2026-4833 is on the availability of systems using Orc discount for markdown processing. By triggering uncontrolled recursion with crafted input, an attacker with local access can cause the application to crash, leading to denial of service. This could disrupt workflows or services that depend on markdown rendering, especially in environments where Orc discount is embedded in local tools or applications. Since exploitation requires local privileges, remote attackers cannot directly exploit this vulnerability, limiting its risk in exposed network services. However, insider threats or compromised local accounts could leverage this to cause service interruptions. The integrity and confidentiality of data are not directly affected. Organizations with automated markdown processing pipelines or local markdown editing tools using affected versions may experience operational disruptions. The lack of known active exploitation reduces immediate risk but public exploit availability increases the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2026-4833, organizations should first monitor for official patches or updates from the Orc discount maintainers and apply them promptly once available. In the absence of patches, implement input validation to detect and reject markdown inputs containing excessively nested blockquotes or recursive structures. Limit the recursion depth in the markdown processing code if possible, either by configuring the parser or modifying the source code to enforce maximum nesting levels. Restrict local access to systems running Orc discount to trusted users only, minimizing the risk of local exploitation. Employ application-level sandboxing or resource limits to prevent crashes from impacting critical systems. Additionally, monitor logs for abnormal markdown processing errors or crashes that could indicate exploitation attempts. Educate local users about the risks of processing untrusted markdown content. Finally, consider alternative markdown processors with better security track records if Orc discount is not critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-25T14:19:41.105Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c57a813c064ed76f9f9da1

Added to database: 3/26/2026, 6:27:13 PM

Last enriched: 3/26/2026, 6:35:02 PM

Last updated: 3/26/2026, 7:31:15 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses