{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2655","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-18T06:43:13.411Z","datePublished":"2026-02-18T14:02:06.141Z","dateUpdated":"2026-02-23T10:17:43.776Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:17:43.776Z"},"title":"ChaiScript chaiscript_defines.hpp operator use after free","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-416","lang":"en","description":"Use After Free"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"ChaiScript","versions":[{"version":"6.0","status":"affected"},{"version":"6.1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2,"vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":2.5,"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.5,"vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1,"vectorString":"AV:L/AC:H/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-18T07:48:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346453","name":"VDB-346453 | ChaiScript chaiscript_defines.hpp operator use after free","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346453","name":"VDB-346453 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.752788","name":"Submit #752788 | ChaiScript develop branch Use After Free","tags":["third-party-advisory"]},{"url":"https://github.com/ChaiScript/ChaiScript/issues/632","tags":["issue-tracking"]},{"url":"https://github.com/ChaiScript/ChaiScript/issues/632#issue-3827824936","tags":["exploit","issue-tracking"]},{"url":"https://github.com/ChaiScript/ChaiScript/","tags":["product"]}]},"adp":[{"references":[{"url":"https://github.com/ChaiScript/ChaiScript/issues/632","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-18T14:39:47.645451Z","id":"CVE-2026-2655","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-18T14:39:51.039Z"}}]}}