CVE-2025-3122

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-3122
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3122.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-3122
Downstream
Published
2025-04-02T22:15:21Z
Modified
2025-10-08T00:14:33.076366Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

References

Affected packages

Git / github.com/webassembly/wabt

Affected ranges

Type
GIT
Repo
https://github.com/webassembly/wabt
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0
1.0.1
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14
1.0.15
1.0.16
1.0.17
1.0.18
1.0.19
1.0.2
1.0.20
1.0.21
1.0.22
1.0.23
1.0.24
1.0.25
1.0.26
1.0.27
1.0.28
1.0.29
1.0.3
1.0.30
1.0.31
1.0.32
1.0.33
1.0.34
1.0.35
1.0.36
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9

Other

binary_0xa
binary_0xb
binary_0xc
binary_0xd
gh-actions-test
gh-actions-test2