CVE-2026-4750
Out-of-Bounds Read in woof Before 15.3.0 Causes Data Exposure
Publication date: 2026-03-24
Last updated on: 2026-05-05
Assigner: Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fabiangreffrath | woof | to 15.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-4750 is an out-of-bounds read vulnerability found in the Woof project, specifically in the `clone` function within the `src/m_scanner.c` file. This function was originally cloned from GNU Aspell/Aspell but did not include a critical security patch that fixed a similar issue (CVE-2019-17544). The vulnerability occurs due to improper handling of trailing backslashes in the scanner code, which can cause the program to read memory outside the intended bounds, leading to memory safety issues.
The issue is addressed by applying the same patch used in GNU Aspell/Aspell to prevent out-of-bounds reads in the `Unescape()` function, ensuring that input is properly handled to avoid accessing memory beyond allocated limits.
How can this vulnerability impact me? :
This vulnerability can lead to serious security risks because it allows an attacker to cause an out-of-bounds read, which may result in memory safety issues such as information disclosure or application crashes.
Given the CVSS v3.1 base score of 9.1 with high impact on confidentiality and availability, an attacker could exploit this vulnerability remotely without any privileges or user interaction, potentially leading to sensitive data exposure or denial of service.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability is an out-of-bounds read in the `clone` function within the `src/m_scanner.c` file of the Woof project, triggered by improper handling of trailing backslashes in input to the scanner code.
Detection would involve monitoring or analyzing inputs processed by the Woof scanner, especially those containing trailing backslashes that could trigger the out-of-bounds read.
However, no specific detection commands or network/system scanning commands are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update Woof to version 15.3.0 or later, where the security fix addressing this out-of-bounds read vulnerability has been applied.
The fix involves applying the patch that prevents out-of-bounds reads in the `Unescape()` function, ensuring proper handling of input to the scanner.
If updating is not immediately possible, avoid processing inputs with trailing backslashes that could trigger the vulnerability.