Duty Analyst: Sara Ríos Sánchez

CVE-2026-33491

Published: 2026-03-26 19:17:04 | Last modified: 2026-04-02 18:22:46

HIGH CVSS 7.8
No EPSS data

Description

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.

CVSS details

Severity
high
Score
7.8
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-33491",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Secondary",
                    "source": "security-advisories@github.com",
                    "cvssData": {
                        "scope": "UNCHANGED",
                        "version": "3.1",
                        "baseScore": 7.8,
                        "attackVector": "LOCAL",
                        "baseSeverity": "HIGH",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "integrityImpact": "HIGH",
                        "userInteraction": "REQUIRED",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "HIGH",
                        "privilegesRequired": "NONE",
                        "confidentialityImpact": "HIGH"
                    },
                    "impactScore": 5.9,
                    "exploitabilityScore": 1.8
                }
            ]
        },
        "published": "2026-03-26T19:17:04.333",
        "references": [
            {
                "url": "https://github.com/zenc-lang/zenc/security/advisories/GHSA-rv74-w6q7-h8xr",
                "tags": [
                    "Exploit",
                    "Mitigation",
                    "Vendor Advisory"
                ],
                "source": "security-advisories@github.com"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Primary",
                "source": "security-advisories@github.com",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-121"
                    },
                    {
                        "lang": "en",
                        "value": "CWE-787"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch."
            },
            {
                "lang": "es",
                "value": "Zen C es un lenguaje de programaci\u00f3n de sistemas que compila a GNU C/C11 legible por humanos. Antes de la versi\u00f3n 0.4.4, una vulnerabilidad de desbordamiento de b\u00fafer basado en pila en el compilador de Zen C permite a los atacantes causar un fallo del compilador o potencialmente ejecutar c\u00f3digo arbitrario al proporcionar un archivo fuente de Zen C especialmente dise\u00f1ado ('.zc') con identificadores de estructura, funci\u00f3n o rasgo excesivamente largos. Se aconseja a los usuarios actualizar a la versi\u00f3n v0.4.4 de Zen C o posterior para recibir un parche."
            }
        ],
        "lastModified": "2026-04-02T18:22:46.130",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "1E99D9DF-A1A1-4BC9-8F4E-AD1C71070E9D",
                                "versionEndExcluding": "0.4.4"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "security-advisories@github.com"
    }
}