CVE-2025-6273

A vulnerability was found in WebAssembly wabt up to 1.0.37 and classified as problematic. This issue affects the function LogOpcode of the file src/binary-reader-objdump.cc. The manipulation leads to reachable assertion. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains that this issue might not affect "real world wasm programs".
References
Link Resource
https://github.com/WebAssembly/wabt/issues/2574 Exploit Issue Tracking Vendor Advisory
https://github.com/user-attachments/files/19529411/wabt_crash.txt Exploit
https://vuldb.com/?ctiid.313277 Permissions Required VDB Entry
https://vuldb.com/?id.313277 Third Party Advisory VDB Entry
https://vuldb.com/?submit.593010 Third Party Advisory VDB Entry
https://github.com/WebAssembly/wabt/issues/2574 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webassembly:wabt:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-06-19 19:15

Updated : 2026-01-06 16:24


NVD link : CVE-2025-6273

Mitre link : CVE-2025-6273

CVE.ORG link : CVE-2025-6273


JSON object : View

Products Affected

webassembly

  • wabt
CWE
CWE-617

Reachable Assertion