Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15572: Memory Leak in wasm3

0
Medium
VulnerabilityCVE-2025-15572cvecve-2025-15572
Published: Tue Feb 10 2026 (02/10/2026, 15:32:08 UTC)
Source: CVE Database V5
Product: wasm3

Description

A vulnerability has been found in wasm3 up to 0.5.0. The affected element is the function NewCodePage. The manipulation leads to memory leak. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Unfortunately, the project has no active maintainer at the moment.

AI-Powered Analysis

AILast updated: 02/10/2026, 16:01:44 UTC

Technical Analysis

CVE-2025-15572 identifies a memory leak vulnerability in the wasm3 WebAssembly interpreter, specifically affecting the NewCodePage function in versions 0.1 through 0.5.0. wasm3 is a lightweight WebAssembly runtime often embedded in local applications and devices. The vulnerability arises from improper memory management during code page allocation, leading to gradual memory leakage when the function is invoked. Exploitation requires local access with low privileges and no user interaction, meaning an attacker must already have some foothold on the system. The memory leak can cause resource exhaustion, potentially degrading system performance or causing denial of service conditions over time. The vulnerability has been publicly disclosed, but no patches or fixes exist due to the absence of an active maintainer for the wasm3 project. No known exploits have been observed in the wild yet, but the public disclosure increases the risk of exploitation attempts. The CVSS 4.8 score reflects medium severity, considering the local attack vector, low complexity, and limited impact confined to availability degradation. The vulnerability does not affect confidentiality or integrity. Given wasm3's use in embedded systems and local applications, the threat mainly targets environments where wasm3 is deployed locally rather than exposed remotely.

Potential Impact

For European organizations, the primary impact of CVE-2025-15572 is on system availability and stability. Systems embedding wasm3 could experience gradual memory exhaustion leading to crashes or degraded performance, potentially disrupting critical local applications or embedded devices. This could affect sectors relying on embedded WebAssembly runtimes such as IoT device manufacturers, industrial automation, and software development environments. Since exploitation requires local access, the risk is higher in environments with multiple users or where attackers can gain initial access through other means. The lack of an active maintainer and absence of patches complicate remediation efforts, increasing exposure duration. While no direct data breach or integrity compromise is expected, denial of service or system instability could indirectly impact business operations and service continuity. Organizations with strict uptime requirements or those operating critical infrastructure should be particularly cautious. The medium severity rating suggests the threat is manageable but warrants proactive mitigation.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement compensating controls to mitigate CVE-2025-15572. First, restrict local access to systems running wasm3 to trusted users only, employing strong authentication and access controls. Monitor memory usage closely on affected systems to detect abnormal leaks early and trigger alerts. Consider isolating wasm3 processes in containers or sandboxes to limit impact scope. Evaluate the feasibility of replacing wasm3 with alternative actively maintained WebAssembly runtimes that do not exhibit this vulnerability. For development environments, enforce strict code review and limit use of vulnerable wasm3 versions. Maintain up-to-date backups and incident response plans to handle potential denial of service scenarios. Engage with the wasm3 community or consider forking the project to develop internal patches if feasible. Finally, educate local administrators and users about the risk of local exploitation and the importance of minimizing unnecessary local access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-08T08:59:36.539Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b52ca4b57a58fa117f4ed

Added to database: 2/10/2026, 3:46:18 PM

Last enriched: 2/10/2026, 4:01:44 PM

Last updated: 2/21/2026, 2:16:24 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats