DEBIAN-CVE-2025-15411

Source
https://security-tracker.debian.org/tracker/CVE-2025-15411
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-15411.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-15411
Upstream
  • CVE-2025-15411
Published
2026-01-01T20:15:40.640Z
Modified
2026-01-02T11:15:33.545247Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

A weakness has been identified in WebAssembly wabt up to 1.0.39. This vulnerability affects the function wabt::AST::InsertNode of the file /src/repro/wabt/bin/wasm-decompile of the component wasm-decompile. This manipulation causes memory corruption. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. Unfortunately, the project has no active maintainer at the moment. In a reply to the issue report somebody recommended to the researcher to provide a PR himself.

References

Affected packages

Debian:11 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.20-1
1.0.21-1
1.0.24-1
1.0.24-2
1.0.25-1
1.0.26-1
1.0.27-1
1.0.28-1
1.0.29-1
1.0.30-1
1.0.31-1
1.0.32-1
1.0.33-1
1.0.34-1
1.0.34+dsfg2+~cs1.0.32-1
1.0.34+dsfg2+~cs1.0.32-2
1.0.34+dsfg2+~cs1.0.32-3
1.0.34+dsfg2+~cs1.0.32-4
1.0.34+dsfg+~cs1.0.32-1
1.0.36+dfsg+~cs1.0.36-1
1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-15411.json"

Debian:12 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.32-1
1.0.33-1
1.0.34-1
1.0.34+dsfg2+~cs1.0.32-1
1.0.34+dsfg2+~cs1.0.32-2
1.0.34+dsfg2+~cs1.0.32-3
1.0.34+dsfg2+~cs1.0.32-4
1.0.34+dsfg+~cs1.0.32-1
1.0.36+dfsg+~cs1.0.36-1
1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-15411.json"

Debian:13 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-15411.json"

Debian:14 / wabt

Package

Name
wabt
Purl
pkg:deb/debian/wabt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.36+dfsg+~cs1.0.36-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-15411.json"