CVE-2025-14956: Heap-based Buffer Overflow in WebAssembly Binaryen
A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.
CVE-2025-14956: Heap-based Buffer Overflow in WebAssembly Binaryen
Description
A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:38:51.694Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69458084f063e4fadff5e839
Added to database: 12/19/2025, 4:42:44 PM
Last updated: 12/19/2025, 4:43:45 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66580: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive
CriticalCVE-2025-65035: CWE-502: Deserialization of Untrusted Data in pluginsGLPI databaseinventory
MediumCVE-2025-14955: Improper Initialization in Open5GS
MediumCVE-2025-14812: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York ArcSearch
HighCVE-2024-49587: The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. in Palantir com.palantir.gotham:glutton
CriticalActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.