Bytecodealliance Wasmtime vulnerabilities
40 known vulnerabilities affecting bytecodealliance/wasmtime.
Total CVEs
40
CISA KEV
0
Public exploits
0
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH7MEDIUM19LOW9
Vulnerabilities
Page 1 of 2
CVE-2026-34971CRITICALCVSS 9.0v>= 32.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-34971 [CRITICAL] CWE-125 CVE-2026-34971: Wasmtime is a runtime for WebAssembly. From 32.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's
Wasmtime is a runtime for WebAssembly. From 32.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Cranelift compilation backend contains a bug on aarch64 when performing a certain shape of heap accesses which means that the wrong address is accessed. When combined with explicit bounds checks a guest WebAssembly module this can create a situation
ghsanvdosv
CVE-2026-34987CRITICALCVSS 9.0v>= 25.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-34987 [CRITICAL] CWE-125 CVE-2026-34987: Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime wi
Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime with its Winch (baseline) non-default compiler backend may allow properly constructed guest Wasm to access host memory outside of its linear-memory sandbox. This vulnerability requires use of the Winch compiler (-Ccompiler=winch). By default, Wasmtime
ghsanvdosv
CVE-2026-34941MEDIUMCVSS 6.9fixed in 24.0.7v>= 25.0.0, < 36.0.7+2 more2026-04-09
CVE-2026-34941 [MEDIUM] CWE-125 CVE-2026-34941: Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contain
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of the input string when performing a bounds check. Specifically the number of code units were checked
ghsanvdosv
CVE-2026-35186MEDIUMCVSS 6.1v>= 25.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-35186 [MEDIUM] CWE-789 CVE-2026-35186: Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's
Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler backend contains a bug where translating the table.grow operator causes the result to be incorrectly typed. For 32-bit tables this means that the result of the operator, internally in Winch, is tagged as a 64-bit value instead of a 32-bi
ghsanvdosv
CVE-2026-35195MEDIUMCVSS 6.1fixed in 24.0.7v>= 25.0.0, < 36.0.7+2 more2026-04-09
CVE-2026-35195 [MEDIUM] CWE-787 CVE-2026-35195: Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's imple
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings between components contains a bug where the return value of a guest component's realloc is not validated before the host attempts to write through the pointer. This enables a guest to cause the host to write arbitrary
ghsanvdosv
CVE-2026-34943MEDIUMCVSS 5.6fixed in 24.0.7v>= 25.0.0, < 36.0.7+2 more2026-04-09
CVE-2026-34943 [MEDIUM] CWE-248 CVE-2026-34943: Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contain
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this val
ghsanvdosv
CVE-2026-34944MEDIUMCVSS 4.1fixed in 24.0.7v>= 25.0.0, < 36.0.7+2 more2026-04-09
CVE-2026-34944 [MEDIUM] CWE-248 CVE-2026-34944: Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, On x86-64 platfo
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, On x86-64 platforms with SSE3 disabled Wasmtime's compilation of the f64x2.splat WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped
ghsanvdosv
CVE-2026-34946MEDIUMCVSS 5.9v>= 25.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-34946 [MEDIUM] CWE-670 CVE-2026-34946: Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's
Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a vulnerability where the compilation of the table.fill instruction can result in a host panic. This means that a valid guest can be compiled with Winch, on any architecture, and cause the host to panic. This represents a denial
ghsanvdosv
CVE-2026-34942MEDIUMCVSS 5.9fixed in 24.0.7v>= 25.0.0, < 36.0.7+2 more2026-04-09
CVE-2026-34942 [MEDIUM] CWE-129 CVE-2026-34942: Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's imple
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings improperly verified the alignment of reallocated strings. This meant that unaligned pointers could be passed to the host for transcoding which would trigger a
ghsanvdosv
CVE-2026-34945LOWCVSS 2.3v>= 25.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-34945 [LOW] CWE-681 CVE-2026-34945: Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's
Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a bug where a 64-bit table, part of the memory64 proposal of WebAssembly, incorrectly translated the table.size instruction. This bug could lead to disclosing data on the host's stack to WebAssembly guests. The host's stack can pos
ghsanvdosv
CVE-2026-34988LOWCVSS 2.3v>= 28.0.0, < 36.0.7v>= 37.0.0, < 42.0.2+1 more2026-04-09
CVE-2026-34988 [LOW] CWE-119 CVE-2026-34988: Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's
Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of its pooling allocator contains a bug where in certain configurations the contents of linear memory can be leaked from one instance to the next. The implementation of resetting the virtual memory permissions for linear memory used the wro
ghsanvdosv
CVE-2026-34983LOWCVSS 1.0v>= 43.0.0, < 43.0.12026-04-09
CVE-2026-34983 [LOW] CWE-416 CVE-2026-34983: Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can resu
Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls made by the host. Specifically, the following steps must occur to trigger the bug clone a wasmtime::Link
ghsanvdosv
CVE-2026-27572MEDIUMCVSS 6.9fixed in 24.0.6≥ 25.0.0, < 36.0.6+5 more2026-02-24
CVE-2026-27572 [MEDIUM] CWE-770 CVE-2026-27572: Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0,
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the `wasi:http/types.fields` resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the `wasmtime-wasi-http` crate is backed by a data structure which panics w
ghsanvdosv
CVE-2026-27195MEDIUMCVSS 6.9≥ 39.0.0, < 40.0.4≥ 41.0.0, < 41.0.4+2 more2026-02-24
CVE-2026-27195 [MEDIUM] CWE-755 CVE-2026-27195: Wasmtime is a runtime for WebAssembly. Starting with Wasmtime 39.0.0, the `component-model-async` fe
Wasmtime is a runtime for WebAssembly. Starting with Wasmtime 39.0.0, the `component-model-async` feature became the default, which brought with it a new implementation of `[Typed]Func::call_async` which made it capable of calling async-typed guest export functions. However, that implementation had a bug leading to a panic under certain circumstance
ghsanvdosv
CVE-2026-27204MEDIUMCVSS 6.9fixed in 24.0.6≥ 25.0.0, < 36.0.6+5 more2026-02-24
CVE-2026-27204 [MEDIUM] CWE-400 CVE-2026-27204: Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0,
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vec
ghsanvdosv
CVE-2026-24116MEDIUMCVSS 4.1≥ 29.0.0, < 36.0.5≥ 40.0.0, < 40.0.3+4 more2026-01-27
CVE-2026-24116 [MEDIUM] CWE-125 CVE-2026-24116: Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.
Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime's compilation of the `f64.copysign` WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due
ghsanvdosv
CVE-2025-64345LOWCVSS 1.8v>= 38.0.1, < 38.0.4v>= 37.0.0, < 37.0.3+2 more2025-11-12
CVE-2025-64345 [LOW] CWE-362 CVE-2025-64345: Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, and 24.0.5, Wasmtime
Wasmtime is a runtime for WebAssembly. Prior to version 38.0.4, 37.0.3, 36.0.3, and 24.0.5, Wasmtime's Rust embedder API contains an unsound interaction where a WebAssembly shared linear memory could be viewed as a type which provides safe access to the host (Rust) to the contents of the linear memory. This is not sound for shared linear memories, whic
ghsanvdosv
CVE-2025-62711LOWCVSS 2.1≥ 38.0.0, < 38.0.3v>= 38.0.0, < 38.0.32025-10-24
CVE-2025-62711 [LOW] CWE-755 CVE-2025-62711: Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation
Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called in a specific way, would crash the host with a segfault or assert failure. Wasmtime 38.0.3 has been relea
ghsanvdosv
CVE-2025-61670LOWCVSS 1.0v37.0.0v37.0.1+1 more2025-10-07
CVE-2025-61670 [LOW] CWE-772 CVE-2025-61670: Wasmtime is a runtime for WebAssembly. Wasmtime 37.0.0 and 37.0.1 have memory leaks in the C/C++ API
Wasmtime is a runtime for WebAssembly. Wasmtime 37.0.0 and 37.0.1 have memory leaks in the C/C++ API when using bindings for the `anyref` or `externref` WebAssembly values. This is caused by a regression introduced during the development of 37.0.0 and all prior versions of Wasmtime are unaffected. If `anyref` or `externref` is not used in the C/C++ API
nvd
CVE-2025-53901LOWCVSS 3.5fixed in 24.0.4≥ 33.0.0, < 33.0.2+3 more2025-07-18
CVE-2025-53901 [LOW] CWE-672 CVE-2025-53901: Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.4, 33.0.2, and 34.0.2, a bug in Wasmti
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.4, 33.0.2, and 34.0.2, a bug in Wasmtime's implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder). The specific bug is triggered by calling `path_open` after calling `fd_renumber` with either two equal argument values or a
ghsanvdosv
1 / 2Next →