We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-39333



Description

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

Reserved 2023-07-28 | Published 2024-09-07 | Updated 2025-04-30 | Assigner hackerone

Product status

Default status
unaffected

4.0 before 4.*
affected

5.0 before 5.*
affected

6.0 before 6.*
affected

7.0 before 7.*
affected

8.0 before 8.*
affected

9.0 before 9.*
affected

10.0 before 10.*
affected

11.0 before 11.*
affected

12.0 before 12.*
affected

13.0 before 13.*
affected

14.0 before 14.*
affected

15.0 before 15.*
affected

16.0 before 16.*
affected

17.0 before 17.*
affected

18.0 before 18.18.2
affected

19.0 before 19.*
affected

20.0 before 20.8.1
affected

References

nodejs.org/...g/vulnerability/october-2023-security-releases

cve.org (CVE-2023-39333)

nvd.nist.gov (CVE-2023-39333)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-39333

Support options

Helpdesk Chat, Email, Knowledgebase