CVE-2026-3257
Published: 05 March 2026
Summary
CVE-2026-3257 is a critical-severity an unspecified weakness vulnerability in Tokuhirom Unqlite. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-10 (Software Usage Restrictions).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates identification, reporting, and correction of the heap-based overflow flaw in UnQLite Perl module versions through 0.06 by applying patches or upgrading to version 0.07.
Mitigates exploitation of the heap-based overflow vulnerability through memory protection techniques such as address space layout randomization and non-executable heap memory.
Restricts installation and use of the vulnerable UnQLite Perl module versions through 0.06 that embed the outdated 2014 UnQLite library.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Heap-based overflow in network-reachable embedded library (UnQLite Perl binding) with CVSS AV:N/PR:N/UI:N directly enables remote code execution against public-facing applications.
NVD Description
UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library. UnQLite for Perl embeds the UnQLite library. Version 0.06 and earlier of the Perl module uses a version of the library from 2014 that may…
more
be vulnerable to a heap-based overflow.
Deeper analysisAI
CVE-2026-3257 is a vulnerability in UnQLite versions through 0.06 for Perl, which embeds a version of the UnQLite library from 2014 that may be vulnerable to a heap-based overflow. The Perl module UnQLite relies on this embedded library, making all versions up to and including 0.06 potentially affected.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low attack complexity, no privileges, and no user interaction required. Remote attackers can potentially trigger the heap-based overflow, achieving high impacts on confidentiality, integrity, and availability.
Advisories point to UnQLite version 0.07 for Perl as a mitigation, with release changes documented at https://metacpan.org/release/TOKUHIROM/UnQLite-0.07/source/Changes. Additional references include the UnQLite project site at https://unqlite.symisc.net/ and a related CVE-2025-3791 at https://www.cve.org/CVERecord?id=CVE-2025-3791.
Details
- CWE(s)