Description
Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
INFO
Published Date :
2025-12-09T02:52:46.938Z
Last Modified :
2025-12-09T15:21:18.048Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-66627 vulnerability.
| Vendors | Products |
|---|---|
| Wasmi-labs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-66627.