CVE-2025-15413

A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment.
References
Link Resource
https://github.com/wasm3/wasm3/issues/543 Exploit Issue Tracking
https://github.com/wasm3/wasm3/issues/547 Exploit Issue Tracking
https://vuldb.com/?ctiid.339334 Permissions Required VDB Entry
https://vuldb.com/?id.339334 Third Party Advisory VDB Entry
https://vuldb.com/?submit.719829 Third Party Advisory VDB Entry
https://vuldb.com/?submit.719831 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wasm3_project:wasm3:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-01 21:15

Updated : 2026-01-12 19:22


NVD link : CVE-2025-15413

Mitre link : CVE-2025-15413

CVE.ORG link : CVE-2025-15413


JSON object : View

Products Affected

wasm3_project

  • wasm3
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write