EUVD-2026-23145

| CVE-2026-40504 CRITICAL
2026-04-16 VulnCheck GHSA-3r49-76f3-pf2m
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Analysis Updated
Apr 16, 2026 - 02:42 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 16, 2026 - 02:34 vuln.today
cvss_changed
CVSS Changed
Apr 16, 2026 - 02:34 NVD
9.8 (CRITICAL) 9.3 (CRITICAL)
Analysis Generated
Apr 16, 2026 - 01:50 vuln.today

DescriptionNVD

Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting scripts with many string literals at global scope. Attackers can exploit insufficient bounds checking in gravity_fiber_reassign() to corrupt heap metadata and achieve arbitrary code execution in applications that evaluate untrusted scripts.

AnalysisAI

Heap buffer overflow in Creolabs Gravity scripting language before 0.9.6 enables remote code execution when applications evaluate untrusted scripts containing many string literals at global scope. The vulnerability stems from insufficient bounds checking in gravity_fiber_reassign(), allowing heap metadata corruption. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running Creolabs Gravity and document current versions in use; notify relevant development and DevOps teams of critical patch requirement. Within 7 days: Deploy Gravity 0.9.6 or later (containing commit 18b9195) to all production and staging environments; prioritize systems processing external or user-supplied scripts. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23145 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy