A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
References
| Link | Resource |
|---|---|
| https://github.com/WebAssembly/wabt/issues/2537 | Issue Tracking |
| https://github.com/WebAssembly/wabt/issues/2556 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/WebAssembly/wabt/issues/2556#issue-2899598349 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/WebAssembly/wabt/pull/2541 | Issue Tracking |
| https://vuldb.com/?ctiid.299867 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299867 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.515327 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-03-17 08:15
Updated : 2026-01-06 16:29
NVD link : CVE-2025-2368
Mitre link : CVE-2025-2368
CVE.ORG link : CVE-2025-2368
JSON object : View
Products Affected
webassembly
- wabt
