TopVuln

High-risk vulnerability digests

CVE-2026-27572

  • MEDIUM

paxforth (=0.1.0), wasmtime-cli (=0.13.0) +4 more potentially affected by CVE-2021-39216 +18 more via wasmtime (=0.13.0)

Details

CVSS v3
7.5
CVSS v4
6.9
NVD published
2026-02-24 22:16:32
EPSS
<0.1% probability · 7.8th percentile — 2026-04-05
Affected versions
cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*
Summary
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the `wasi:http/types.fields` resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the `wasmtime-wasi-http` crate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking. There are no known workarounds at this time. Embedders are encouraged to update to a patched version of Wasmtime.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.