CVE-2026-47316
Description
Improper Check or Handling of Exceptional Conditions vulnerability in Samsung Open Source Escargot allows Input Data Manipulation.
This issue affects Escargot: 590345cc6258317c5da850d846ce6baaf2afc2d3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Improper exception handling in Samsung Escargot before commit 590345cc allows input data manipulation via crafted JavaScript.
Vulnerability
An improper check or handling of exceptional conditions vulnerability exists in Samsung Open Source Escargot JavaScript engine at commit 590345cc6258317c5da850d846ce6baaf2afc2d3. The flaw occurs when the engine fails to correctly handle certain exceptional conditions during script execution, potentially allowing an attacker to manipulate input data. The issue is addressed in Pull Request #1565, which fixes multiple crash-related problems [1].
Exploitation
An attacker can exploit this vulnerability by providing a specially crafted JavaScript input to the Escargot engine. No authentication or special privileges are required if the engine is exposed to untrusted scripts (e.g., in a browser or server-side environment). The exact sequence involves triggering an exceptional condition that the engine does not properly check, leading to data manipulation. The PR description mentions fixes for crashes related to setArrayLength and proxy objects, suggesting these code paths are involved [1].
Impact
Successful exploitation allows an attacker to manipulate input data, which could lead to information disclosure, denial of service, or potentially further compromise depending on the context. The CVSS v3 score of 5.5 (Medium) indicates a moderate impact on confidentiality, integrity, or availability. The vulnerability does not appear to enable remote code execution based on available information.
Mitigation
The vulnerability is fixed in the commit associated with Pull Request #1565 [1]. Users should update their Escargot installation to a version that includes this fix. As of the publication date (2026-05-19), no official release version has been announced, but the patch is available in the repository. No workarounds are documented. The CVE is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: = 590345cc6258317c5da850d846ce6baaf2afc2d3
Patches
1590345cc6258Update vendor test
1 file changed · +1 −1
test/vendortest+1 −1 modified@@ -1 +1 @@ -Subproject commit 71d8a3453148662bcbde7cd8180aaea7bf29ae32 +Subproject commit e17c4680af0a133981ab19aa6ea0b67bd705f66c
Vulnerability mechanics
Root cause
"Improper handling of exceptional conditions during input processing in Escargot allows a crafted input to trigger an unrecoverable error state."
Attack vector
An attacker can supply a specially crafted input to the Escargot JavaScript engine. The vulnerability is triggered when the engine encounters an exceptional condition (such as an unexpected data structure or malformed input) that is not properly checked or handled [CWE-703]. The attack requires local access and user interaction (e.g., opening a malicious script or webpage), and it does not require authentication. The result is a denial-of-service condition (availability impact) as the engine enters an undefined or crash state.
Affected code
The patch updates the vendor test subproject reference in `test/vendortest` [patch_id=600624]. The advisory does not specify which source files within Escargot contain the vulnerable code path. The vulnerability involves improper handling of exceptional conditions during input processing, likely in the parser or interpreter components that process user-supplied JavaScript or script data.
What the fix does
The patch updates the vendor test subproject commit from `71d8a3453148662bcbde7cd8180aaea7bf29ae32` to `e17c4680af0a133981ab19aa6ea0b67bd705f66c` [patch_id=600624]. The advisory does not provide the source-level diff within Escargot itself, so the exact code change is not visible from this patch alone. However, the vendor test update likely includes test cases that validate proper handling of the previously unhandled exceptional condition, closing the vulnerability by ensuring the engine gracefully handles the malformed input instead of entering an undefined state.
Preconditions
- inputAttacker must supply a crafted input that triggers an exceptional condition in Escargot.
- authNo authentication required.
- networkLocal access required; the victim must open the malicious input (e.g., via a script or webpage).
Generated on May 19, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
1News mentions
0No linked articles in our index yet.