CVE-2025-66627

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:*

History

10 Dec 2025, 21:16

Type Values Removed Values Added
CPE cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*
cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:*
References () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-g4v2-cjqp-rfmq - () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-g4v2-cjqp-rfmq - Patch, Vendor Advisory
First Time Wasmi-labs
Wasmi-labs wasmi

09 Dec 2025, 16:18

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 16:18

Updated : 2025-12-10 21:16


NVD link : CVE-2025-66627

Mitre link : CVE-2025-66627

CVE.ORG link : CVE-2025-66627


JSON object : View

Products Affected

wasmi-labs

  • wasmi
CWE
CWE-416

Use After Free