CVE-2025-3122

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/WebAssembly/wabt/issues/2565 Exploit Issue Tracking Vendor Advisory
https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.303013 Permissions Required VDB Entry
https://vuldb.com/?id.303013 Third Party Advisory VDB Entry
https://vuldb.com/?submit.525091 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.36:*:*:*:*:*:*:*

History

23 Sep 2025, 16:54

Type Values Removed Values Added
CPE cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.36:*:*:*:*:*:*:*
References () https://github.com/WebAssembly/wabt/issues/2565 - () https://github.com/WebAssembly/wabt/issues/2565 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 - () https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.303013 - () https://vuldb.com/?ctiid.303013 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.303013 - () https://vuldb.com/?id.303013 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.525091 - () https://vuldb.com/?submit.525091 - Third Party Advisory, VDB Entry
First Time Webassembly webassembly Binary Toolkit
Webassembly

07 Apr 2025, 14:18

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad clasificada como problemática se encontró en WebAssembly WABT 1.0.36. Afectado por esta vulnerabilidad está la función BinaryReaderInterp::BeginFunctionBody del archivo src/interp/binary-lecter-interp.cc. La manipulación conduce a la deserción del puntero nulo. El ataque se puede lanzar de forma remota. Es un ataque de complejidad bastante alta. Parece difícil de explotar. Se ha hecho público el exploit y puede que sea utilizado.

02 Apr 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-02 22:15

Updated : 2025-09-23 16:54


NVD link : CVE-2025-3122

Mitre link : CVE-2025-3122

CVE.ORG link : CVE-2025-3122


JSON object : View

Products Affected

webassembly

  • webassembly_binary_toolkit
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference