VYPR
Medium severity6.9NVD Advisory· Published Apr 13, 2026· Updated Apr 13, 2026

CVE-2026-40446

CVE-2026-40446

Description

Access of resource using incompatible type ('type confusion') vulnerability in Samsung Open Source Escargot allows Pointer Manipulation.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Type confusion vulnerability in Samsung Escargot JavaScript engine allows pointer manipulation via incompatible type access.

Vulnerability

Overview

CVE-2026-40446 is a type confusion vulnerability in the Samsung Open Source Escargot JavaScript engine. The issue arises from accessing a resource using an incompatible type, leading to pointer manipulation. The vulnerability affects Escargot at commit 97e8115ab1110bc502b4b5e4a0c689a71520d335 [1].

Exploitation

An attacker can exploit this vulnerability by crafting malicious JavaScript code that triggers the type confusion. Since Escargot is a JavaScript engine used in various applications, including web browsers, the attack surface is broad. Exploitation likely requires no authentication, as the malicious code could be delivered via a web page or other untrusted input. The attacker must convince a user to execute the crafted script, but no special privileges are needed [1].

Impact

Successful exploitation allows an attacker to manipulate pointers, which can lead to memory corruption. This could potentially enable arbitrary code execution, data leakage, or denial of service. The severity is rated as Medium (CVSS 6.9), indicating a significant but not critical risk [1].

Mitigation

The vulnerability has been addressed in a pull request (#1554) that fixes minor issues in the Escargot codebase. Users are advised to update to the latest version of Escargot that includes this fix. No workarounds are documented, so applying the patch is the recommended course of action [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.