CVE-2026-27204

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*
cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*
cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*
cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*

History

25 Feb 2026, 15:20

Type Values Removed Values Added
First Time Bytecodealliance
Bytecodealliance wasmtime
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*
References () https://docs.rs/wasmtime-wasi/latest/wasmtime_wasi/struct.WasiCtxBuilder.html#method.max_random_size - () https://docs.rs/wasmtime-wasi/latest/wasmtime_wasi/struct.WasiCtxBuilder.html#method.max_random_size - Product
References () https://docs.rs/wasmtime/latest/wasmtime/component/struct.ResourceTable.html#method.set_max_capacity - () https://docs.rs/wasmtime/latest/wasmtime/component/struct.ResourceTable.html#method.set_max_capacity - Product
References () https://docs.rs/wasmtime/latest/wasmtime/struct.Store.html#method.set_hostcall_fuel - () https://docs.rs/wasmtime/latest/wasmtime/struct.Store.html#method.set_hostcall_fuel - Product
References () https://docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html - () https://docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html - Product
References () https://github.com/bytecodealliance/wasmtime/issues/11552 - () https://github.com/bytecodealliance/wasmtime/issues/11552 - Issue Tracking
References () https://github.com/bytecodealliance/wasmtime/pull/12599 - () https://github.com/bytecodealliance/wasmtime/pull/12599 - Issue Tracking, Third Party Advisory
References () https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-852m-cvvp-9p4w - () https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-852m-cvvp-9p4w - Third Party Advisory

24 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 22:16

Updated : 2026-02-25 15:20


NVD link : CVE-2026-27204

Mitre link : CVE-2026-27204

CVE.ORG link : CVE-2026-27204


JSON object : View

Products Affected

bytecodealliance

  • wasmtime
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling

CWE-774

Allocation of File Descriptors or Handles Without Limits or Throttling

CWE-789

Memory Allocation with Excessive Size Value