A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/WebAssembly/wabt/issues/2565 | Exploit Issue Tracking Vendor Advisory |
https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 | Exploit Issue Tracking Vendor Advisory |
https://vuldb.com/?ctiid.303013 | Permissions Required VDB Entry |
https://vuldb.com/?id.303013 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.525091 | Third Party Advisory VDB Entry |
Configurations
History
23 Sep 2025, 16:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.36:*:*:*:*:*:*:* | |
References | () https://github.com/WebAssembly/wabt/issues/2565 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://vuldb.com/?ctiid.303013 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.303013 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.525091 - Third Party Advisory, VDB Entry | |
First Time |
Webassembly webassembly Binary Toolkit
Webassembly |
07 Apr 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Apr 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-02 22:15
Updated : 2025-09-23 16:54
NVD link : CVE-2025-3122
Mitre link : CVE-2025-3122
CVE.ORG link : CVE-2025-3122
JSON object : View
Products Affected
webassembly
- webassembly_binary_toolkit