CVE-2025-62711

Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called in a specific way, would crash the host with a segfault or assert failure. Wasmtime 38.0.3 has been released and is patched to fix this issue. There are no workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*

History

03 Nov 2025, 19:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.1
First Time Bytecodealliance
Bytecodealliance wasmtime
References () https://github.com/bytecodealliance/wasmtime/commit/192f2fcdadfec9d0cf6b58548a85a7307450cbf5 - () https://github.com/bytecodealliance/wasmtime/commit/192f2fcdadfec9d0cf6b58548a85a7307450cbf5 - Patch
References () https://github.com/bytecodealliance/wasmtime/pull/11592 - () https://github.com/bytecodealliance/wasmtime/pull/11592 - Patch
References () https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4h67-722j-5pmc - () https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4h67-722j-5pmc - Patch, Third Party Advisory
CPE cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*

24 Oct 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-24 22:15

Updated : 2025-11-03 19:26


NVD link : CVE-2025-62711

Mitre link : CVE-2025-62711

CVE.ORG link : CVE-2025-62711


JSON object : View

Products Affected

bytecodealliance

  • wasmtime
CWE
CWE-755

Improper Handling of Exceptional Conditions