Summary
A use-after-free vulnerability has been discovered in the linear memory implementation of Wasmi. This issue can be triggered by a WebAssembly module under certain memory growth conditions, potentially leading to memory corruption, information disclosure, or code execution.
Impact
- Confidentiality: High – attacker-controlled memory reads possible.
- Integrity: High – memory corruption may allow arbitrary writes.
- Availability: High – interpreter crashes possible.
Affected Versions
Wasmi v0.41.0 through Wasmi v1.0.0.
Patches
The following versions have patches available that fix this bug:
- Wasmi
v0.41.2, v0.41.3
- Wasmi
v0.47.1, v0.47.2
- Wasmi
v0.51.3, v0.51.4, v0.51.5
- Wasmi
v1.0.1 (and later)
Workarounds
- Upgrade to the latest patched version of Wasmi.
- Consider limiting the maximum linear memory sizes where feasible.
Credits
This vulnerability was discovered by Robert T. Morris (RTM).
References
CVE-2025-66627
Summary
A use-after-free vulnerability has been discovered in the linear memory implementation of Wasmi. This issue can be triggered by a WebAssembly module under certain memory growth conditions, potentially leading to memory corruption, information disclosure, or code execution.
Impact
Affected Versions
Wasmi
v0.41.0through Wasmiv1.0.0.Patches
The following versions have patches available that fix this bug:
v0.41.2,v0.41.3v0.47.1,v0.47.2v0.51.3,v0.51.4,v0.51.5v1.0.1(and later)Workarounds
Credits
This vulnerability was discovered by Robert T. Morris (RTM).
References
CVE-2025-66627