A vulnerability has been found in wasm3 up to 0.5.0. The affected element is the function NewCodePage. The manipulation leads to memory leak. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Unfortunately, the project has no active maintainer at the moment.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/cve-proofs/blob/main/POC-20251203-07/repro | Exploit |
| https://github.com/wasm3/wasm3/ | Product |
| https://github.com/wasm3/wasm3/issues/550 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.344934 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344934 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.752765 | Third Party Advisory VDB Entry |
Configurations
History
12 Feb 2026, 15:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/oneafter/cve-proofs/blob/main/POC-20251203-07/repro - Exploit | |
| References | () https://github.com/wasm3/wasm3/ - Product | |
| References | () https://github.com/wasm3/wasm3/issues/550 - Exploit, Issue Tracking | |
| References | () https://vuldb.com/?ctiid.344934 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.344934 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.752765 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:wasm3_project:wasm3:*:*:*:*:*:*:*:* | |
| First Time |
Wasm3 Project
Wasm3 Project wasm3 |
10 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 16:16
Updated : 2026-02-12 15:22
NVD link : CVE-2025-15572
Mitre link : CVE-2025-15572
CVE.ORG link : CVE-2025-15572
JSON object : View
Products Affected
wasm3_project
- wasm3
