CVE-2026-30960

Source
https://cve.org/CVERecord?id=CVE-2026-30960
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30960.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-30960
Aliases
Published
2026-03-10T17:11:10.797Z
Modified
2026-03-14T12:48:49.730606Z
Severity
  • 9.4 (Critical) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
RSSN has Arbitrary Code Execution via Unvalidated JIT Instruction Generation in C-FFI Interface
Details

rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.

Database specific
{
    "cwe_ids": [
        "CWE-269",
        "CWE-695",
        "CWE-754",
        "CWE-94"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30960.json"
}
References

Affected packages

Git / github.com/apich-organization/rssn

Affected ranges

Type
GIT
Repo
https://github.com/apich-organization/rssn
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.1.12
0.1.13
Other
dylib
dylib-v0.*
dylib-v0.1.10
dylib-v0.1.11
dylib-v0.1.7
dylib-v0.1.8
v0.*
v0.1.14
v0.1.15
v0.1.17
v0.1.18
v0.1.19
v0.1.21
v0.1.21-avx2
v0.2.0-rc.1
v0.2.2
v0.2.3
v0.2.4
v0.2.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30960.json"