CVE-2025-2368

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-2368
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2368.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-2368
Downstream
Published
2025-03-17T08:15:11.493Z
Modified
2026-01-08T06:46:11.518680Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

References

Affected packages

Git / github.com/webassembly/wabt

Affected ranges

Type
GIT
Repo
https://github.com/webassembly/wabt
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0
1.0.1
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14
1.0.15
1.0.16
1.0.17
1.0.18
1.0.19
1.0.2
1.0.20
1.0.21
1.0.22
1.0.23
1.0.24
1.0.25
1.0.26
1.0.27
1.0.28
1.0.29
1.0.3
1.0.30
1.0.31
1.0.32
1.0.33
1.0.34
1.0.35
1.0.36
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9

Other

binary_0xa
binary_0xb
binary_0xc
binary_0xd
gh-actions-test
gh-actions-test2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-2368.json"