CVE-2025-6273

A vulnerability was found in WebAssembly wabt up to 1.0.37 and classified as problematic. This issue affects the function LogOpcode of the file src/binary-reader-objdump.cc. The manipulation leads to reachable assertion. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains that this issue might not affect "real world wasm programs".
References
Link Resource
https://github.com/WebAssembly/wabt/issues/2574 Exploit Issue Tracking Vendor Advisory
https://github.com/user-attachments/files/19529411/wabt_crash.txt Exploit
https://vuldb.com/?ctiid.313277 Permissions Required VDB Entry
https://vuldb.com/?id.313277 Third Party Advisory VDB Entry
https://vuldb.com/?submit.593010 Third Party Advisory VDB Entry
https://github.com/WebAssembly/wabt/issues/2574 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webassembly:wabt:*:*:*:*:*:*:*:*

History

06 Jan 2026, 16:24

Type Values Removed Values Added
References () https://github.com/WebAssembly/wabt/issues/2574 - () https://github.com/WebAssembly/wabt/issues/2574 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/user-attachments/files/19529411/wabt_crash.txt - () https://github.com/user-attachments/files/19529411/wabt_crash.txt - Exploit
References () https://vuldb.com/?ctiid.313277 - () https://vuldb.com/?ctiid.313277 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.313277 - () https://vuldb.com/?id.313277 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.593010 - () https://vuldb.com/?submit.593010 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:webassembly:wabt:*:*:*:*:*:*:*:*
First Time Webassembly
Webassembly wabt

23 Jun 2025, 20:16

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en WebAssembly WABT hasta la versión 1.0.37, clasificada como problemática. Este problema afecta a la función LogOpcode del archivo src/binary-reader-objdump.cc. La manipulación genera una aserción accesible. Se requiere acceso local para abordar este ataque. Se ha hecho público el exploit y puede que sea utilizado. La existencia real de esta vulnerabilidad aún se duda. El responsable del código explica que este problema podría no afectar a los programas WASM del mundo real.
References () https://github.com/WebAssembly/wabt/issues/2574 - () https://github.com/WebAssembly/wabt/issues/2574 -

19 Jun 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-19 19:15

Updated : 2026-01-06 16:24


NVD link : CVE-2025-6273

Mitre link : CVE-2025-6273

CVE.ORG link : CVE-2025-6273


JSON object : View

Products Affected

webassembly

  • wabt
CWE
CWE-617

Reachable Assertion