Description

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.

INFO

Published Date :

2025-12-09T02:52:46.938Z

Last Modified :

2025-12-09T15:21:18.048Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-66627 vulnerability.

Vendors Products
Wasmi-labs
  • Wasmi
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-66627.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact