2026-02-21 21:2CVE-2026-2887VulDB
PUBLISHED5.2CWE-674CWE-404x_open-source

aardappel lobster idents.h TypeName recursion

A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the function lobster::TypeName in the library dev/src/lobster/idents.h. Such manipulation leads to uncontrolled recursion. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2026.1 will fix this issue. The name of the patch is 8ba49f98ccfc9734ef352146806433a41d9f9aa6. It is advisable to upgrade the affected component.

Problem type

Affected products

aardappel

lobster

2025.0 - AFFECTED

2025.1 - AFFECTED

2025.2 - AFFECTED

2025.3 - AFFECTED

2025.4 - AFFECTED

2026.1 - UNAFFECTED

References

GitHub Security Advisories

GHSA-v43p-pv9w-gqmf

A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the...

https://github.com/advisories/GHSA-v43p-pv9w-gqmf

A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the function lobster::TypeName in the library dev/src/lobster/idents.h. Such manipulation leads to uncontrolled recursion. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2026.1 will fix this issue. The name of the patch is 8ba49f98ccfc9734ef352146806433a41d9f9aa6. It is advisable to upgrade the affected component.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-2887
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-2887",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2026-02-21T21:02:16.010Z",
    "dateReserved": "2026-02-20T17:07:30.695Z",
    "datePublished": "2026-02-21T21:02:16.010Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2026-02-21T21:02:16.010Z"
      },
      "title": "aardappel lobster idents.h TypeName recursion",
      "descriptions": [
        {
          "lang": "en",
          "value": "A security vulnerability has been detected in aardappel lobster up to 2025.4. This impacts the function lobster::TypeName in the library dev/src/lobster/idents.h. Such manipulation leads to uncontrolled recursion. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2026.1 will fix this issue. The name of the patch is 8ba49f98ccfc9734ef352146806433a41d9f9aa6. It is advisable to upgrade the affected component."
        }
      ],
      "affected": [
        {
          "vendor": "aardappel",
          "product": "lobster",
          "versions": [
            {
              "version": "2025.0",
              "status": "affected"
            },
            {
              "version": "2025.1",
              "status": "affected"
            },
            {
              "version": "2025.2",
              "status": "affected"
            },
            {
              "version": "2025.3",
              "status": "affected"
            },
            {
              "version": "2025.4",
              "status": "affected"
            },
            {
              "version": "2026.1",
              "status": "unaffected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Uncontrolled Recursion",
              "cweId": "CWE-674",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Denial of Service",
              "cweId": "CWE-404",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.347181",
          "name": "VDB-347181 | aardappel lobster idents.h TypeName recursion",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.347181",
          "name": "VDB-347181 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.755026",
          "name": "Submit #755026 | aardappel lobster c8a6042 Uncontrolled Recursion",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/aardappel/lobster/issues/397",
          "tags": [
            "issue-tracking"
          ]
        },
        {
          "url": "https://github.com/aardappel/lobster/issues/397#issuecomment-3849015088",
          "tags": [
            "issue-tracking"
          ]
        },
        {
          "url": "https://github.com/oneafter/0204/blob/main/lob3/repro.lobster",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "https://github.com/aardappel/lobster/commit/8ba49f98ccfc9734ef352146806433a41d9f9aa6",
          "tags": [
            "patch"
          ]
        },
        {
          "url": "https://github.com/aardappel/lobster/releases/tag/v2026.1",
          "tags": [
            "patch"
          ]
        },
        {
          "url": "https://github.com/aardappel/lobster/",
          "tags": [
            "product"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "baseScore": 3.3,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "baseScore": 3.3,
            "baseSeverity": "LOW"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C",
            "baseScore": 1.7
          }
        }
      ],
      "timeline": [
        {
          "time": "2026-02-20T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2026-02-20T01:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2026-02-20T18:12:36.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Oneafter (VulDB User)",
          "type": "reporter"
        }
      ],
      "tags": [
        "x_open-source"
      ]
    }
  }
}