Description
A weakness has been identified in WebAssembly wabt up to 1.0.39. This vulnerability affects the function wabt::AST::InsertNode of the file /src/repro/wabt/bin/wasm-decompile of the component wasm-decompile. This manipulation causes memory corruption. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. Unfortunately, the project has no active maintainer at the moment. In a reply to the issue report somebody recommended to the researcher to provide a PR himself.
Problem types
Product status
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14
1.0.15
1.0.16
1.0.17
1.0.18
1.0.19
1.0.20
1.0.21
1.0.22
1.0.23
1.0.24
1.0.25
1.0.26
1.0.27
1.0.28
1.0.29
1.0.30
1.0.31
1.0.32
1.0.33
1.0.34
1.0.35
1.0.36
1.0.37
1.0.38
1.0.39
Timeline
| 2026-01-01: | Advisory disclosed |
| 2026-01-01: | VulDB entry created |
| 2026-01-01: | VulDB entry last update |
Credits
Oneafter (VulDB User)
References
vuldb.com/?id.339332 (VDB-339332 | WebAssembly wabt wasm-decompile InsertNode memory corruption)
vuldb.com/?ctiid.339332 (VDB-339332 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.719825 (Submit #719825 | WebAssembly wabt 1.0.39 and master-branch Heap-based Buffer Overflow)
github.com/WebAssembly/wabt/issues/2679
github.com/oneafter/1208/blob/main/af1
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.