Home

Description

A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-02-28 | Published 2026-03-01 | Updated 2026-03-01 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

Memory Corruption

Timeline

2026-02-28:Advisory disclosed
2026-02-28:VulDB entry created
2026-02-28:VulDB entry last update

Credits

Oneafter (VulDB User) reporter

References

vuldb.com/?id.348268 (VDB-348268 | ChaiScript boxed_number.hpp get_as memory corruption) vdb-entry technical-description

vuldb.com/?ctiid.348268 (VDB-348268 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.761301 (Submit #761301 | ChaiScript develop branch Memory Corruption) third-party-advisory

github.com/ChaiScript/ChaiScript/issues/635 issue-tracking

github.com/ChaiScript/ChaiScript/issues/635 exploit issue-tracking

github.com/ChaiScript/ChaiScript/ product

cve.org (CVE-2026-3382)

nvd.nist.gov (CVE-2026-3382)

Download JSON