Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
References
| Link | Resource |
|---|---|
| https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-g4v2-cjqp-rfmq | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:* |
|
| References | () https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-g4v2-cjqp-rfmq - Patch, Vendor Advisory | |
| First Time |
Wasmi-labs
Wasmi-labs wasmi |
09 Dec 2025, 16:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 16:18
Updated : 2025-12-10 21:16
NVD link : CVE-2025-66627
Mitre link : CVE-2025-66627
CVE.ORG link : CVE-2025-66627
JSON object : View
Products Affected
wasmi-labs
- wasmi
CWE
CWE-416
Use After Free
