Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15413: Memory Corruption in wasm3

0
Medium
VulnerabilityCVE-2025-15413cvecve-2025-15413
Published: Thu Jan 01 2026 (01/01/2026, 21:02:06 UTC)
Source: CVE Database V5
Product: wasm3

Description

A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment.

AI-Powered Analysis

AILast updated: 01/08/2026, 21:59:28 UTC

Technical Analysis

CVE-2025-15413 identifies a memory corruption vulnerability in wasm3, a lightweight WebAssembly interpreter, affecting all versions up to 0.5.0. The flaw resides in the functions op_SetSlot_i32 and op_CallIndirect within the m3_exec.h source file. These functions handle WebAssembly execution slots and indirect function calls, respectively. Improper manipulation of these functions can corrupt memory, potentially leading to application crashes or undefined behavior. The vulnerability requires local access with low privileges, meaning an attacker must have some form of local system access but does not require elevated privileges or user interaction to exploit. The vulnerability is rated medium severity with a CVSS 4.8 score, reflecting limited attack vector (local), low complexity, and partial impact on confidentiality, integrity, and availability. The wasm3 project currently lacks an active maintainer, and no official patches or fixes have been released, increasing the risk of exploitation as public exploit code is available. This situation necessitates that users of wasm3 carefully evaluate their exposure, especially in environments where wasm3 is embedded or used in local execution contexts.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in potential memory corruption leading to application instability, crashes, or possible execution of arbitrary code depending on the exploitation context. Since wasm3 is a lightweight WebAssembly interpreter often embedded in IoT devices, edge computing, or local applications, organizations relying on such technologies could face service disruptions or data integrity issues. The local access requirement limits remote exploitation risk but raises concerns for insider threats or compromised local accounts. The lack of active maintenance and absence of patches increase the window of exposure. Industries such as manufacturing, automotive, telecommunications, and software development in Europe that integrate wasm3 into their products or workflows may be particularly vulnerable. The medium severity rating suggests moderate risk, but the operational impact could be significant if exploited in critical systems.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict local access to systems running wasm3 to trusted users only, employing strict access controls and monitoring. 2) Employ application sandboxing or containerization to limit the impact of potential memory corruption within wasm3 processes. 3) Conduct thorough code audits and consider replacing wasm3 with alternative WebAssembly runtimes that are actively maintained and have no known vulnerabilities. 4) Monitor for unusual application behavior or crashes that could indicate exploitation attempts. 5) If feasible, apply custom patches or mitigations by reviewing the vulnerable functions in m3_exec.h to harden memory handling, though this requires in-house expertise. 6) Maintain up-to-date inventories of software components to identify all wasm3 instances and prioritize risk assessments. 7) Educate local users about the risks of executing untrusted code locally to reduce the chance of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T09:23:09.668Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6956e38cdb813ff03e814b25

Added to database: 1/1/2026, 9:13:48 PM

Last enriched: 1/8/2026, 9:59:28 PM

Last updated: 2/7/2026, 8:16:42 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats