Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen

0
Medium
VulnerabilityCVE-2025-14957cvecve-2025-14957
Published: Fri Dec 19 2025 (12/19/2025, 17:02:16 UTC)
Source: CVE Database V5
Vendor/Project: WebAssembly
Product: Binaryen

Description

A vulnerability was identified in WebAssembly Binaryen up to 125. This affects the function IRBuilder::makeLocalGet/IRBuilder::makeLocalSet/IRBuilder::makeLocalTee of the file src/wasm/wasm-ir-builder.cpp of the component IRBuilder. Such manipulation of the argument Index leads to null pointer dereference. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 6fb2b917a79578ab44cf3b900a6da4c27251e0d4. Applying a patch is advised to resolve this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:07:29 UTC

Technical Analysis

CVE-2025-14957 is a vulnerability in the WebAssembly Binaryen tool, specifically in version 125 and earlier, affecting the IRBuilder component responsible for constructing intermediate representations of WebAssembly code. The vulnerability arises from improper handling of the argument Index in the functions IRBuilder::makeLocalGet, IRBuilder::makeLocalSet, and IRBuilder::makeLocalTee located in src/wasm/wasm-ir-builder.cpp. When an attacker manipulates this Index argument, it results in a NULL pointer dereference, causing the application to crash or behave unexpectedly. This flaw requires local access with low privileges (PR:L) and does not require user interaction or authentication, making it somewhat easier to exploit in environments where local access is possible. The vulnerability has a CVSS 4.8 score, reflecting medium severity due to limited impact scope and exploitation complexity. The issue does not compromise confidentiality, integrity, or availability beyond potential denial of service. A patch has been released (commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4) to fix the flaw by properly validating the Index argument before use. No known exploits are currently active in the wild, but a public exploit exists, increasing the urgency for remediation. Binaryen is widely used in WebAssembly toolchains for compiling and optimizing code, so affected environments include development systems, build servers, and any infrastructure using Binaryen 125 or earlier.

Potential Impact

The primary impact of CVE-2025-14957 is denial of service through application crashes caused by NULL pointer dereference. This can disrupt development workflows, continuous integration pipelines, or runtime environments that rely on Binaryen for WebAssembly code generation or optimization. While the vulnerability does not allow remote exploitation or privilege escalation, it can cause instability in local environments, potentially halting build processes or automated deployments. Organizations relying on WebAssembly for critical applications or services may experience interruptions or delays. Since exploitation requires local access, the risk is higher in multi-user systems, shared development environments, or compromised hosts where an attacker has gained limited access. The availability of a public exploit increases the risk of opportunistic attacks, especially in environments where patching is delayed. However, the vulnerability does not directly expose sensitive data or allow code execution beyond crashing the process.

Mitigation Recommendations

To mitigate CVE-2025-14957, organizations should immediately apply the official patch identified by commit 6fb2b917a79578ab44cf3b900a6da4c27251e0d4 to update Binaryen to a fixed version beyond 125. Development and build environments should enforce strict access controls to limit local access to trusted users only, reducing the risk of exploitation. Implement monitoring for abnormal crashes or failures in WebAssembly compilation processes to detect potential exploitation attempts. Incorporate Binaryen updates into regular software supply chain management and continuous integration pipelines to ensure timely patching. If patching is temporarily not possible, consider isolating build environments or using containerization to limit the impact of crashes. Educate developers and system administrators about the vulnerability and the importance of applying updates promptly. Finally, review and harden local user permissions and audit logs to detect unauthorized access that could lead to exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-19T08:53:10.207Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945875ff063e4fadffe4627

Added to database: 12/19/2025, 5:11:59 PM

Last enriched: 2/24/2026, 11:07:29 PM

Last updated: 3/24/2026, 12:42:08 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses