Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Minetest
Minetest minetest |
|
| CPEs | cpe:2.3:a:minetest:minetest:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Minetest
Minetest minetest |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Luanti
Luanti luanti |
|
| Vendors & Products |
Luanti
Luanti luanti |
Thu, 23 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-749 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 23 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Luanti (formerly Minetest) is an open source voxel game-creation platform. Starting in version 5.0.0 and prior to version 5.15.2, a malicious mod can trivially escape the sandboxed Lua environment to execute arbitrary code and gain full filesystem access on the user's device. This applies to the server-side mod, async and mapgen as well as the client-side (CSM) environments. This vulnerability is only exploitable when using LuaJIT. Version 5.15.2 contains a patch. On release versions, one can also patch this issue without recompiling by editing `builtin/init.lua` and adding the line `getfenv = nil` at the end. Note that this will break mods relying on this function (which is not inherently unsafe). | |
| Title | Luanti has a mod security sandbox escape | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T14:38:39.113Z
Reserved: 2026-04-18T02:51:52.973Z
Link: CVE-2026-41196
Updated: 2026-04-23T14:38:32.465Z
Status : Analyzed
Published: 2026-04-23T02:16:17.900
Modified: 2026-05-14T16:35:18.110
Link: CVE-2026-41196
OpenCVE Enrichment
Updated: 2026-04-28T15:15:34Z