Cyber Posture

CVE-2026-3257

Critical

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3257 is a critical-severity an unspecified weakness vulnerability in Tokuhirom Unqlite. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-10 (Software Usage Restrictions).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates identification, reporting, and correction of the heap-based overflow flaw in UnQLite Perl module versions through 0.06 by applying patches or upgrading to version 0.07.

prevent

Mitigates exploitation of the heap-based overflow vulnerability through memory protection techniques such as address space layout randomization and non-executable heap memory.

prevent

Restricts installation and use of the vulnerable UnQLite Perl module versions through 0.06 that embed the outdated 2014 UnQLite library.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Heap-based overflow in network-reachable embedded library (UnQLite Perl binding) with CVSS AV:N/PR:N/UI:N directly enables remote code execution against public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library. UnQLite for Perl embeds the UnQLite library. Version 0.06 and earlier of the Perl module uses a version of the library from 2014 that may…

more

be vulnerable to a heap-based overflow.

Deeper analysisAI

CVE-2026-3257 is a vulnerability in UnQLite versions through 0.06 for Perl, which embeds a version of the UnQLite library from 2014 that may be vulnerable to a heap-based overflow. The Perl module UnQLite relies on this embedded library, making all versions up to and including 0.06 potentially affected.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low attack complexity, no privileges, and no user interaction required. Remote attackers can potentially trigger the heap-based overflow, achieving high impacts on confidentiality, integrity, and availability.

Advisories point to UnQLite version 0.07 for Perl as a mitigation, with release changes documented at https://metacpan.org/release/TOKUHIROM/UnQLite-0.07/source/Changes. Additional references include the UnQLite project site at https://unqlite.symisc.net/ and a related CVE-2025-3791 at https://www.cve.org/CVERecord?id=CVE-2025-3791.

Details

CWE(s)

Affected Products

tokuhirom
unqlite
≤ 0.07

CVEs Like This One

CVE-2025-15604Same vendor: Tokuhirom

References