Impact
The Winch compiler in Wasmtime incorrectly processes the WASM table.fill instruction after a refactoring change, causing it to use an invalid table indexing scheme. When executed, the compiled code can reference a non‑existent or wrong table, leading the host process to panic. This crash results in a denial‑of‑service condition that halts the Wasmtime runtime.
Affected Systems
All Wasmtime releases from 25.0.0 up to, but excluding, 36.0.7, as well as earlier versions of 42.0.2 and 43.0.1 before the patch, are vulnerable. The vulnerability affects the bytecodealliance wasmtime product across all supported architectures.
Risk and Exploitability
The CVSS score of 5.9 categorizes the issue as moderate in severity, and the EPSS score is not publicly available. The vulnerability is not listed in CISA’s KEV catalog, indicating no confirmed mass exploitation yet. Nonetheless, the attack vector is straightforward: any WebAssembly module compiled with Winch that contains a table.fill instruction can trigger a host panic. An attacker only needs to supply such a module, making the exploitation conditions minimal and the risk to services accepting untrusted WebAssembly payloads significant.
OpenCVE Enrichment
Github GHSA