Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-64713

Опубликовано: 25 нояб. 2025
Источник: nvd
CVSS3: 5.1
CVSS3: 7.4
EPSS Низкий

Описание

WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*
Версия до 2.4.4 (исключая)

EPSS

Процентиль: 3%
0.00016
Низкий

5.1 Medium

CVSS3

7.4 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

msrc
22 дня назад

WebAssembly Micro Runtime frame_offset_bottom array bounds overflow in fast Interpreter mode when handling GET_GLOBAL(I32) followed by if opcode

EPSS

Процентиль: 3%
0.00016
Низкий

5.1 Medium

CVSS3

7.4 High

CVSS3

Дефекты

CWE-119