Description
A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Timeline
| 2026-02-18: | Advisory disclosed |
| 2026-02-18: | VulDB entry created |
| 2026-02-18: | VulDB entry last update |
Credits
Oneafter (VulDB User)
References
github.com/ChaiScript/ChaiScript/issues/632
vuldb.com/?id.346453 (VDB-346453 | ChaiScript chaiscript_defines.hpp operator use after free)
vuldb.com/?ctiid.346453 (VDB-346453 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.752788 (Submit #752788 | ChaiScript develop branch Use After Free)
github.com/ChaiScript/ChaiScript/issues/632
github.com/ChaiScript/ChaiScript/issues/632
github.com/ChaiScript/ChaiScript/