CVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen
A vulnerability was identified in WebAssembly Binaryen up to 125. This affects the function IRBuilder::makeLocalGet/IRBuilder::makeLocalSet/IRBuilder::makeLocalTee of the file src/wasm/wasm-ir-builder.cpp of the component IRBuilder. Such manipulation of the argument Index leads to null pointer dereference. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 6fb2b917a79578ab44cf3b900a6da4c27251e0d4. Applying a patch is advised to resolve this issue.
AI Analysis
Technical Summary
CVE-2025-14957 is a vulnerability identified in WebAssembly Binaryen up to version 125, specifically within the IRBuilder component's functions makeLocalGet, makeLocalSet, and makeLocalTee located in src/wasm/wasm-ir-builder.cpp. The vulnerability arises from improper handling of the argument Index, which leads to a null pointer dereference. This type of flaw typically results in application crashes or denial of service conditions when the affected functions attempt to access or manipulate memory through a null pointer. The attack vector requires local access with low privileges, meaning an attacker must have some level of access to the system but does not require elevated privileges or user interaction. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing potential crashes. The exploit code is publicly available, increasing the risk of exploitation, although no known active exploitation campaigns have been reported. The vendor has released a patch identified by commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4 to address the issue. The CVSS 4.0 base score is 4.8, reflecting a medium severity due to the limited attack vector and impact scope. This vulnerability is relevant for organizations that use Binaryen in their WebAssembly toolchains or runtime environments, especially in development or CI/CD pipelines where local code execution is common.
Potential Impact
For European organizations, the primary impact of CVE-2025-14957 is the potential for denial of service or application instability in environments utilizing WebAssembly Binaryen version 125. This can disrupt software development workflows, continuous integration systems, or production environments that rely on WebAssembly compilation or optimization. While the vulnerability does not directly compromise data confidentiality or integrity, service availability interruptions can lead to operational delays and increased remediation costs. Organizations with internal development teams or cloud environments running WebAssembly toolchains are at risk if local access controls are weak or if untrusted users have local system access. The presence of a public exploit increases the likelihood of opportunistic attacks, especially in shared or multi-tenant environments. European sectors with high reliance on software development, such as finance, telecommunications, and technology, may experience indirect impacts through disrupted development cycles or compromised build environments.
Mitigation Recommendations
To mitigate CVE-2025-14957, European organizations should immediately apply the official patch identified by commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4 to all affected Binaryen installations. Additionally, enforce strict local access controls to limit who can execute or modify WebAssembly toolchains, reducing the risk of exploitation by unauthorized users. Implement monitoring and alerting for abnormal crashes or service disruptions related to WebAssembly compilation processes. In development and CI/CD environments, isolate build systems and restrict execution privileges to trusted users only. Regularly update WebAssembly-related dependencies and maintain an inventory of software versions to quickly identify vulnerable instances. Conduct security reviews of WebAssembly integration points and consider sandboxing or containerization to limit the blast radius of potential crashes. Finally, educate developers and system administrators about this vulnerability and the importance of applying patches promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen
Description
A vulnerability was identified in WebAssembly Binaryen up to 125. This affects the function IRBuilder::makeLocalGet/IRBuilder::makeLocalSet/IRBuilder::makeLocalTee of the file src/wasm/wasm-ir-builder.cpp of the component IRBuilder. Such manipulation of the argument Index leads to null pointer dereference. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 6fb2b917a79578ab44cf3b900a6da4c27251e0d4. Applying a patch is advised to resolve this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-14957 is a vulnerability identified in WebAssembly Binaryen up to version 125, specifically within the IRBuilder component's functions makeLocalGet, makeLocalSet, and makeLocalTee located in src/wasm/wasm-ir-builder.cpp. The vulnerability arises from improper handling of the argument Index, which leads to a null pointer dereference. This type of flaw typically results in application crashes or denial of service conditions when the affected functions attempt to access or manipulate memory through a null pointer. The attack vector requires local access with low privileges, meaning an attacker must have some level of access to the system but does not require elevated privileges or user interaction. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing potential crashes. The exploit code is publicly available, increasing the risk of exploitation, although no known active exploitation campaigns have been reported. The vendor has released a patch identified by commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4 to address the issue. The CVSS 4.0 base score is 4.8, reflecting a medium severity due to the limited attack vector and impact scope. This vulnerability is relevant for organizations that use Binaryen in their WebAssembly toolchains or runtime environments, especially in development or CI/CD pipelines where local code execution is common.
Potential Impact
For European organizations, the primary impact of CVE-2025-14957 is the potential for denial of service or application instability in environments utilizing WebAssembly Binaryen version 125. This can disrupt software development workflows, continuous integration systems, or production environments that rely on WebAssembly compilation or optimization. While the vulnerability does not directly compromise data confidentiality or integrity, service availability interruptions can lead to operational delays and increased remediation costs. Organizations with internal development teams or cloud environments running WebAssembly toolchains are at risk if local access controls are weak or if untrusted users have local system access. The presence of a public exploit increases the likelihood of opportunistic attacks, especially in shared or multi-tenant environments. European sectors with high reliance on software development, such as finance, telecommunications, and technology, may experience indirect impacts through disrupted development cycles or compromised build environments.
Mitigation Recommendations
To mitigate CVE-2025-14957, European organizations should immediately apply the official patch identified by commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4 to all affected Binaryen installations. Additionally, enforce strict local access controls to limit who can execute or modify WebAssembly toolchains, reducing the risk of exploitation by unauthorized users. Implement monitoring and alerting for abnormal crashes or service disruptions related to WebAssembly compilation processes. In development and CI/CD environments, isolate build systems and restrict execution privileges to trusted users only. Regularly update WebAssembly-related dependencies and maintain an inventory of software versions to quickly identify vulnerable instances. Conduct security reviews of WebAssembly integration points and consider sandboxing or containerization to limit the blast radius of potential crashes. Finally, educate developers and system administrators about this vulnerability and the importance of applying patches promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:53:10.207Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6945875ff063e4fadffe4627
Added to database: 12/19/2025, 5:11:59 PM
Last enriched: 12/19/2025, 5:27:10 PM
Last updated: 12/19/2025, 6:19:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14960: SQL Injection in code-projects Simple Blood Donor Management System
MediumCVE-2025-14959: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-14958: Heap-based Buffer Overflow in floooh sokol
MediumCVE-2025-68478: CWE-73: External Control of File Name or Path in langflow-ai langflow
HighCVE-2025-68430: CWE-24: Path Traversal: '../filedir' in cvat-ai cvat
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.