CVE-2025-3122

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/WebAssembly/wabt/issues/2565 Exploit Issue Tracking Vendor Advisory
https://github.com/WebAssembly/wabt/issues/2565#issue-2927572319 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.303013 Permissions Required VDB Entry
https://vuldb.com/?id.303013 Third Party Advisory VDB Entry
https://vuldb.com/?submit.525091 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.36:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-02 22:15

Updated : 2025-09-23 16:54


NVD link : CVE-2025-3122

Mitre link : CVE-2025-3122

CVE.ORG link : CVE-2025-3122


JSON object : View

Products Affected

webassembly

  • webassembly_binary_toolkit
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference