CVE-2025-2584

MEDIUM

Webassembly Wabt - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.300544
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.300544
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.515406
Exploit, Issue Tracking issue-tracking
https://github.com/WebAssembly/wabt/issues/2557
Exploit, Issue Tracking exploit issue-tracking
https://github.com/WebAssembly/wabt/issues/2557#issue-2900405517

Scores

CVSS v3 5.0
EPSS 0.0012
EPSS Percentile 30.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-119 CWE-122 CWE-787
Status published
Products (1)
webassembly/wabt 1.0.36
Published Mar 21, 2025
Tracked Since Feb 18, 2026