Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12875: Out-of-bounds Write in mruby

0
Medium
VulnerabilityCVE-2025-12875cvecve-2025-12875
Published: Fri Nov 07 2025 (11/07/2025, 20:32:07 UTC)
Source: CVE Database V5
Product: mruby

Description

A weakness has been identified in mruby 3.4.0. This vulnerability affects the function ary_fill_exec of the file mrbgems/mruby-array-ext/src/array.c. Executing a manipulation of the argument start/length can lead to out-of-bounds write. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 93619f06dd378db6766666b30c08978311c7ec94. It is best practice to apply a patch to resolve this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:18:09 UTC

Technical Analysis

CVE-2025-12875 identifies an out-of-bounds write vulnerability in mruby version 3.4.0, specifically within the ary_fill_exec function located in the mrbgems/mruby-array-ext/src/array.c file. The vulnerability is triggered by manipulating the start and length parameters passed to this function, which leads to writing outside the allocated memory bounds. This memory corruption flaw can be exploited by a local attacker with limited privileges (local access required, no elevated privileges needed) without requiring user interaction or authentication bypass. The out-of-bounds write could cause unpredictable behavior such as application crashes, data corruption, or potentially enable privilege escalation if exploited in a broader attack chain. The vulnerability has a CVSS 4.8 score, reflecting medium severity due to the local attack vector and limited scope of impact. A public exploit has been released, increasing the risk of exploitation in environments where mruby 3.4.0 is deployed. The vulnerability was patched in a specific commit (93619f06dd378db6766666b30c08978311c7ec94), and applying this patch is the recommended remediation. No known active exploitation campaigns have been reported to date. The vulnerability affects only mruby version 3.4.0, which is a lightweight Ruby implementation often embedded in applications and devices for scripting purposes.

Potential Impact

The primary impact of CVE-2025-12875 is memory corruption via out-of-bounds writes, which can lead to application instability, crashes, or data integrity issues. In some scenarios, this could be leveraged for privilege escalation or arbitrary code execution, especially if combined with other vulnerabilities or misconfigurations. Since exploitation requires local access, the threat is mainly to environments where untrusted users have shell or local access to systems running mruby 3.4.0. This limits the attack surface but does not eliminate risk in multi-user systems, shared hosting, or embedded devices with local user interfaces. Organizations relying on mruby for embedded scripting in critical systems or development environments could face operational disruptions or security breaches if the vulnerability is exploited. The availability of a public exploit increases the urgency for patching to prevent opportunistic attacks. Overall, the impact is moderate but could escalate depending on deployment context and attacker capabilities.

Mitigation Recommendations

To mitigate CVE-2025-12875, organizations should immediately apply the official patch identified by commit 93619f06dd378db6766666b30c08978311c7ec94 to all instances of mruby 3.4.0 in their environment. Beyond patching, restrict local access to systems running mruby to trusted users only, minimizing the risk of local exploitation. Employ strict access controls and monitoring on multi-user systems to detect suspicious local activity. Consider using application sandboxing or containerization to limit the impact of potential memory corruption. Regularly audit and update embedded systems or applications that include mruby to ensure they do not run vulnerable versions. If patching is delayed, implement host-based intrusion detection systems (HIDS) to monitor for exploitation attempts. Finally, educate developers and system administrators about the risks of local vulnerabilities and the importance of timely patch management in embedded scripting environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-07T15:09:38.806Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e59e81aa5a3f4ee1fc7d2

Added to database: 11/7/2025, 8:43:20 PM

Last enriched: 2/24/2026, 10:18:09 PM

Last updated: 3/26/2026, 9:30:45 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses