0.2.10
0.2.9
0.2.9
CVE-2026-30960 represents a critical code injection vulnerability discovered in the rssn Rust library. This flaw allows attackers to inject and execute arbitrary code due to insufficient input validation within the JIT compilation engine, which is exposed through the CFFI. Versions prior to 0.2.9 are affected, and a patch has been released to address the issue.
The vulnerability's impact is severe due to its code injection nature. An attacker can leverage this flaw to execute arbitrary code within the context of the rssn library, potentially gaining complete control over the affected system. The exposed JIT compilation engine and CFFI interface provide a direct pathway for malicious code execution. This could lead to data breaches, system compromise, and further lateral movement within the network. The vulnerability's CWE classifications (CWE-94, CWE-754, CWE-20, CWE-695, CWE-269, CWE-15) highlight the multiple contributing factors to its severity.
CVE-2026-30960 was publicly disclosed on 2026-03-08. The vulnerability's CRITICAL CVSS score (9.5) indicates a high probability of exploitation. As of this writing, there are no publicly available proof-of-concept exploits, but the ease of code injection suggests that one may emerge quickly. It is not currently listed on CISA KEV.
Applications and systems utilizing the rssn Rust library, particularly those that process untrusted input and expose the CFFI interface, are at significant risk. Projects relying on rssn for parsing or processing data from external sources are especially vulnerable. Developers using older versions of rssn in production environments should prioritize upgrading.
• rust / library: Use cargo audit to check for known vulnerabilities in your project's dependencies, including rssn.
cargo audit• rust / library: Examine your project's Cargo.toml file to identify the version of rssn being used.
cat Cargo.toml | grep rssn• generic / system: Monitor system logs for unusual process activity or code execution originating from the rssn library. Look for unexpected function calls or memory allocations. • generic / system: Implement runtime application self-protection (RASP) measures to detect and prevent code injection attempts.
disclosure
Statut de l'Exploit
EPSS
0.01% (percentile 1%)
CISA SSVC
The primary mitigation is to immediately upgrade to rssn version 0.2.9 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing strict input validation on any data passed to the rssn library. While a WAF or proxy cannot directly prevent this code injection, they can be configured to monitor for suspicious patterns in requests and responses. There are no specific Sigma or YARA rules available at this time, but monitoring for unexpected code execution within the rssn library's process is recommended. After upgrading, confirm the fix by attempting to trigger the vulnerable code path with malicious input and verifying that it is now properly sanitized.
Actualice la biblioteca rssn a la versión 0.2.9 o posterior. Esta versión corrige la vulnerabilidad de ejecución de código arbitrario a través de la interfaz CFFI. La actualización evitará que un atacante explote la falta de validación de entrada en la generación de instrucciones JIT.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2026-30960 is a critical code injection vulnerability affecting the rssn Rust library, allowing attackers to execute arbitrary code due to improper input validation in the JIT compilation engine.
You are affected if you are using rssn version 0.2.8 or earlier. Check your project's dependencies to determine if you are using a vulnerable version.
Upgrade to rssn version 0.2.9 or later to remediate the vulnerability. If upgrading is not immediately possible, implement strict input validation.
While no public exploits are currently available, the vulnerability's severity and ease of exploitation suggest that it may be targeted in the future.
Refer to the rssn project's official repository or website for the latest security advisories and updates regarding CVE-2026-30960.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Téléverse ton fichier Cargo.lock et nous te dirons instantanément si tu es affecté.