No, then you've proven you lack the basic understanding of how code is executed. Any code, even the most abstracted scripting language, is either compiled, JIT compiled or interpreted into assembly code. All abstractions and encapsulations are translated into normal memory addresses(pointers) which in turn is moved back and forth between memory and CPU registers. Any language is executed as normal ALU, FPU, conditionals, jumps, etc. on the machine code level. All the abstractions you see when you type your code is gone when it's actually executed on the CPU.
The abstractions in a language does not protect you when a CPU or a kernel have undefined behavior. And when there is a bug causing information leakage due to speculative execution, it doesn't matter if you control your memory allocation or not, since these exploits are about tricking the CPU to write privileged memory back to your unprivileged memory.
So it doesn't matter if your code is written in PHP, JavaScript, Python, Go, Rust, Java or whatever. As long as you either directly or indirectly can trigger the right system calls and the right operations within a timeframe after that, either directly or indirectly, the language is irrelevant. It's this kind of ignorance which causes people to claim their applications is "safe because it's written in language ___"…
These exploits are not limited to languages like C, there have been examples from Java and JavaScript (both Chrome and Firefox)