CVE-2025-14956Improper Restriction of Operations within the Bounds of a Memory Buffer in Binaryen

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 86.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 19
Latest updateJan 13

Description

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vjgx-vcpf-hm6w: A vulnerability was determined in WebAssembly Binaryen up to 1252025-12-19
OSV
CVE-2025-14956: A vulnerability was determined in WebAssembly Binaryen up to 1252025-12-19

📋Vendor Advisories

1
Debian
CVE-2025-14956: binaryen - A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by th...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-14956 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

2
Bugzilla
CVE-2025-14956 binaryen: heap-based buffer overflow in WasmBinaryReader::readExpression() when parsing a malformed WebAssembly binary [fedora-43]2026-01-13
Bugzilla
CVE-2025-14956 binaryen: heap-based buffer overflow in WasmBinaryReader::readExpression() when parsing a malformed WebAssembly binary [fedora-42]2026-01-13
CVE-2025-14956 — Webassembly Binaryen vulnerability | cvebase