TopVuln

High-risk vulnerability digests

CVE-2025-66627

  • HIGH

wasmi_c_api_impl (=0.45.0) potentially affected by CVE-2025-66627 via wasmi (=0.45.0)

Details

CVSS v3
8.4
NVD published
2025-12-09 16:18:21
EPSS
<0.1% probability · 5.4th percentile — 2026-04-05
Affected versions
cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:* cpe:2.3:a:wasmi-labs:wasmi:1.0.0:*:*:*:*:rust:*:*
Summary
Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.