We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6275

WebAssembly wabt binary-reader-interp.cc GetFuncOffset use after free



Description

EN DE

A vulnerability was found in WebAssembly wabt up to 1.0.37. It has been declared as problematic. Affected by this vulnerability is the function GetFuncOffset of the file src/interp/binary-reader-interp.cc. The manipulation leads to use after free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. A similar issue reported during the same timeframe was disputed by the code maintainer because it might not affect "real world wasm programs". Therefore, this entry might get disputed as well in the future.

In WebAssembly wabt bis 1.0.37 wurde eine problematische Schwachstelle ausgemacht. Hierbei betrifft es die Funktion GetFuncOffset der Datei src/interp/binary-reader-interp.cc. Durch Beeinflussen mit unbekannten Daten kann eine use after free-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2025-06-19 | Published 2025-06-19 | Updated 2025-06-19 | Assigner VulDB


MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

Use After Free

Memory Corruption

Product status

1.0.0
affected

1.0.1
affected

1.0.2
affected

1.0.3
affected

1.0.4
affected

1.0.5
affected

1.0.6
affected

1.0.7
affected

1.0.8
affected

1.0.9
affected

1.0.10
affected

1.0.11
affected

1.0.12
affected

1.0.13
affected

1.0.14
affected

1.0.15
affected

1.0.16
affected

1.0.17
affected

1.0.18
affected

1.0.19
affected

1.0.20
affected

1.0.21
affected

1.0.22
affected

1.0.23
affected

1.0.24
affected

1.0.25
affected

1.0.26
affected

1.0.27
affected

1.0.28
affected

1.0.29
affected

1.0.30
affected

1.0.31
affected

1.0.32
affected

1.0.33
affected

1.0.34
affected

1.0.35
affected

1.0.36
affected

1.0.37
affected

Timeline

2025-06-19:Advisory disclosed
2025-06-19:VulDB entry created
2025-06-19:VulDB entry last update

Credits

JJLeo (VulDB User) reporter

References

vuldb.com/?id.313279 (VDB-313279 | WebAssembly wabt binary-reader-interp.cc GetFuncOffset use after free) vdb-entry technical-description

vuldb.com/?ctiid.313279 (VDB-313279 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.593017 (Submit #593017 | WebAssembly wabt wabt 1.0.37 (commit a60eb26) Use After Free) third-party-advisory

github.com/WebAssembly/wabt/issues/2614 issue-tracking

github.com/user-attachments/files/20623626/wabt_crash_5.txt exploit

cve.org (CVE-2025-6275)

nvd.nist.gov (CVE-2025-6275)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6275

Support options

Helpdesk Chat, Email, Knowledgebase