CVE-2026-2659Improper Restriction of Operations within the Bounds of a Memory Buffer in Squirrel

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 98.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument _target_stack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

CVEListV5squirrel-lang/squirrel3.0, 3.1, 3.2+2

🔴Vulnerability Details

2
GHSA
GHSA-4mcw-fcqm-vqg3: A vulnerability was determined in Squirrel up to 32026-02-18
OSV
CVE-2026-2659: A vulnerability was determined in Squirrel up to 32026-02-18

📋Vendor Advisories

1
Debian
CVE-2026-2659: squirrel3 - A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerabi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-2659 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-2659 — Squirrel-lang Squirrel vulnerability | cvebase