CVE-2026-40959

| EUVD-2026-23149 CRITICAL
2026-04-16 mitre
9.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 05:32 vuln.today
v3 (patch_released)
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
5.15.2
Analysis Updated
Apr 16, 2026 - 01:42 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 16, 2026 - 01:38 vuln.today
cvss_changed
Analysis Generated
Apr 16, 2026 - 01:19 vuln.today

DescriptionNVD

Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.

AnalysisAI

Lua sandbox escape in Luanti 5.x (formerly Minetest) game engine allows malicious mod code to break out of LuaJIT security restrictions and execute arbitrary code on the host system. Affects all Luanti 5.0.0 through 5.15.1 when compiled with LuaJIT instead of standard Lua. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all systems running Luanti 5.0.0 through 5.15.1 compiled with LuaJIT and disable untrusted mod installation where operationally feasible. Within 7 days: Upgrade all affected Luanti instances to version 5.15.2 or later (contains upstream sandbox escape fixes). …

Sign in for detailed remediation steps.

Vendor StatusVendor

Share

CVE-2026-40959 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy