Home

Description

A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment.

PUBLISHED Reserved 2026-01-01 | Published 2026-01-01 | Updated 2026-01-05 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Memory Corruption

Timeline

2026-01-01:Advisory disclosed
2026-01-01:VulDB entry created
2026-01-01:VulDB entry last update

Credits

Oneafter (VulDB User) reporter

References

vuldb.com/?id.339334 (VDB-339334 | wasm3 m3_exec.h op_CallIndirect memory corruption) vdb-entry technical-description

vuldb.com/?ctiid.339334 (VDB-339334 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.719829 (Submit #719829 | wasm3 v0.5.0 and master-branch Memory Corruption) third-party-advisory

vuldb.com/?submit.719831 (Submit #719831 | wasm3 v0.5.0 and master-branch Memory Corruption (Duplicate)) third-party-advisory

github.com/wasm3/wasm3/issues/543 issue-tracking

github.com/wasm3/wasm3/issues/547 exploit issue-tracking

cve.org (CVE-2025-15413)

nvd.nist.gov (CVE-2025-15413)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.