Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0852 Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters
Github GHSA Github GHSA GHSA-75jp-vq8x-h4cq Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 02 Jun 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Wasmi-labs
Wasmi-labs wasmi
CPEs cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
Vendors & Products Wasmi-labs
Wasmi-labs wasmi

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-05T18:14:48.975Z

Reserved: 2024-03-04T14:19:14.060Z

Link: CVE-2024-28123

cve-icon Vulnrichment

Updated: 2024-08-02T00:48:49.456Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-21T02:52:23.827

Modified: 2025-06-02T14:06:34.380

Link: CVE-2024-28123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.