Browse all 5 CVE security advisories affecting wren-lang. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Wren-lang is a programming language designed for building secure, high-performance applications with a focus on memory safety. Historically, it has been susceptible to remote code execution vulnerabilities due to unsafe deserialization flaws and cross-site scripting issues through improper input sanitization. Privilege escalation risks have also been documented in certain implementations. The project maintains five CVE records, primarily centered on input validation bypasses and insecure default configurations. While no major security incidents have been widely reported, the language's design prioritizes memory safety to mitigate common vulnerabilities like buffer overflows, though developers must still implement proper security practices to address remaining risks in web-facing applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-3387 | wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereference — wrenCWE-476 | 3.3 | Low | 2026-03-01 |
| CVE-2026-3386 | wren-lang wren wren_compiler.c emitOp out-of-bounds — wrenCWE-125 | 3.3 | Low | 2026-03-01 |
| CVE-2026-3385 | wren-lang wren wren_compiler.c resolveLocal recursion — wrenCWE-674 | 3.3 | Low | 2026-03-01 |
| CVE-2026-2858 | wren-lang wren Source File wren_compiler.c peekChar out-of-bounds — wrenCWE-125 | 3.3 | Low | 2026-02-20 |
| CVE-2026-2657 | wren-lang wren Error Message wren_compiler.c printError stack-based overflow — wrenCWE-121 | 3.3 | Low | 2026-02-18 |
This page lists every published CVE security advisory associated with wren-lang. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.