CVE-2025-43853

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-43853
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-43853.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-43853
Aliases
  • GHSA-8fc8-4g25-c8m7
Published
2025-05-15T18:15:37Z
Modified
2025-05-17T14:14:30.199809Z
Summary
[none]
Details

The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. Anyone running WAMR up to and including version 2.2.0 or WAMR built with libc-uvwasi on Windows is affected by a symlink following vulnerability. On WAMR running in Windows, creating a symlink pointing outside of the preopened directory and subsequently opening it with create flag will create a file on host outside of the sandbox. If the symlink points to an existing host file, it's also possible to open it and read its content. Version 2.3.0 fixes the issue.

References

Affected packages

Git / github.com/bytecodealliance/wasm-micro-runtime

Affected ranges

Type
GIT
Repo
https://github.com/bytecodealliance/wasm-micro-runtime
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

01-12-2020
WAMR-01-18-2022
WAMR-01-29-2021
WAMR-02-18-2020
WAMR-02-27-2020
WAMR-03-05-2020
WAMR-03-19-2020
WAMR-03-25-2021
WAMR-03-30-2020
WAMR-04-15-2020
WAMR-04-15-2021
WAMR-05-18-2022
WAMR-06-15-2020
WAMR-07-10-2020
WAMR-08-10-2021
WAMR-09-08-2020
WAMR-09-29-2020
WAMR-12-30-2021
tag-11-28-2019

WAMR-1.*

WAMR-1.0.0
WAMR-1.1.0
WAMR-1.1.1
WAMR-1.1.2
WAMR-1.2.0
WAMR-1.2.1
WAMR-1.2.2
WAMR-1.2.3
WAMR-1.3.0
WAMR-1.3.1
WAMR-1.3.2

WAMR-2.*

WAMR-2.0.0
WAMR-2.1.0
WAMR-2.1.1
WAMR-2.1.2
WAMR-2.2.0