Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g4v2-cjqp-rfmq | Critical Use-After-Free in Wasmi's Linear Memory |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:* |
Tue, 09 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wasmi-labs
Wasmi-labs wasmi |
|
| Vendors & Products |
Wasmi-labs
Wasmi-labs wasmi |
Tue, 09 Dec 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible. | |
| Title | Wasmi's Linear Memory has a Critical Use After Free Vulnerability | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T15:21:18.048Z
Reserved: 2025-12-05T15:42:44.715Z
Link: CVE-2025-66627
Updated: 2025-12-09T15:21:13.267Z
Status : Analyzed
Published: 2025-12-09T16:18:21.910
Modified: 2025-12-10T21:16:04.107
Link: CVE-2025-66627
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:40Z
Github GHSA