Impact
A failure in the Binaryen library’s IRBuilder::makeBrOn function can trigger an assertion when supplied with malformed input, causing the process using Binaryen to abort. The description indicates that this assertion is reachable and that the exploit is local, meaning an attacker must have some local access to the system running Binaryen. The vulnerability is associated with CWE-617, an input validation issue, and is rated with a CVSS score of 4.8, indicating moderate severity.
Affected Systems
The vulnerable component is WebAssembly Binaryen, versions up through 117. The issue resides in the "src/wasm/wasm‑ir‑builder.cpp" file, specifically the BrOn parser. Only installations of Binaryen that have not applied the patch commit 1251efbc1ea471c1311d2726b2bbe061ff2a291c are affected.
Risk and Exploitability
The CVSS score of 4.8 reflects the local nature and moderate impact of the bug. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. Because the attack requires local access, the likelihood of exploitation is limited to users who can execute code with privileges sufficient to invoke Binaryen functions. The available public patch mitigates the issue by disabling the vulnerable assertion path.
OpenCVE Enrichment