CVE-2024-28123

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28123
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-28123.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-28123
Aliases
Published
2024-03-08T21:29:53Z
Modified
2025-10-20T20:25:38.997185Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters
Details

Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.

Database specific
{
    "cwe_ids": [
        "CWE-787"
    ]
}
References

Affected packages

Git / github.com/wasmi-labs/wasmi

Affected ranges

Type
GIT
Repo
https://github.com/wasmi-labs/wasmi
Events

Affected versions

v0.*

v0.15.0
v0.16.0
v0.17.0
v0.18.0
v0.18.1
v0.19.0
v0.20.0
v0.21.0
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.26.1
v0.27.0
v0.28.0
v0.28.0-wasi
v0.29.0
v0.30.0
v0.31.0