CVE-2025-66627

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:*

History

No history.

Information

Published : 2025-12-09 16:18

Updated : 2025-12-10 21:16


NVD link : CVE-2025-66627

Mitre link : CVE-2025-66627

CVE.ORG link : CVE-2025-66627


JSON object : View

Products Affected

wasmi-labs

  • wasmi
CWE
CWE-416

Use After Free