Skip to main content

CVE-2025-54126: CWE-668: Exposure of Resource to Wrong Sphere in bytecodealliance wasm-micro-runtime

Medium
VulnerabilityCVE-2025-54126cvecve-2025-54126cwe-668
Published: Tue Jul 29 2025 (07/29/2025, 21:52:36 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasm-micro-runtime

Description

The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.

AI-Powered Analysis

AILast updated: 07/29/2025, 22:17:55 UTC

Technical Analysis

CVE-2025-54126 is a medium-severity vulnerability affecting the WebAssembly Micro Runtime (WAMR), specifically its iwasm executable binary component. WAMR is a lightweight WebAssembly runtime that supports the WebAssembly System Interface (WASI) and command line interface, enabling execution of WebAssembly modules in various environments. The vulnerability exists in versions 2.4.0 and earlier, where the iwasm component uses the --addr-pool parameter with an IPv4 address that lacks a subnet mask. This configuration flaw causes the system to accept connections from all IP addresses rather than restricting access to a specific IP range as intended. The absence of a subnet mask means that the access control mechanism is effectively bypassed, exposing the service to all incoming network connections. This exposure can lead to unauthorized access to services that rely on --addr-pool for IP-based access control, especially in production deployments where administrators may incorrectly assume that specifying an IP address without a subnet mask is secure by default. The vulnerability is categorized under CWE-668 (Exposure of Resource to Wrong Sphere), indicating improper access control boundaries. The issue is resolved in WAMR version 2.4.1, where the handling of --addr-pool has been corrected to enforce proper subnet masking and restrict access as configured. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network exploitable conditions without authentication or user interaction, but with limited impact on confidentiality, integrity, or availability. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations deploying WAMR, especially those using the iwasm component in production environments, this vulnerability poses a risk of unauthorized external access to services that were intended to be restricted by IP address. This could lead to exposure of sensitive internal WebAssembly workloads or services, potentially allowing attackers to execute unauthorized code or access data. The impact is particularly relevant for sectors relying on WebAssembly for edge computing, IoT gateways, or cloud-native applications, where WAMR is used to run lightweight, sandboxed modules. Unauthorized access could undermine confidentiality and operational security, though the vulnerability does not directly enable privilege escalation or code execution beyond the exposed service. European organizations with strict data protection requirements (e.g., GDPR) must consider the risk of data exposure or breach resulting from this vulnerability. Additionally, the inadvertent exposure could serve as a foothold for further attacks if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the ease of exploitation (no authentication or user interaction required) increases the urgency of remediation in sensitive environments.

Mitigation Recommendations

European organizations should promptly upgrade WAMR to version 2.4.1 or later, where the vulnerability is fixed by enforcing proper subnet mask handling in the --addr-pool parameter. Until upgrade is possible, organizations should avoid using the --addr-pool option without explicitly specifying a subnet mask to ensure access restrictions are correctly applied. Network-level controls such as firewalls and intrusion prevention systems should be configured to restrict access to the iwasm service only to trusted IP ranges, effectively compensating for the runtime's misconfiguration. Conduct thorough audits of deployment configurations to identify any instances where --addr-pool is used without subnet masks and remediate accordingly. Monitoring network traffic for unexpected connections to the iwasm service can help detect potential exploitation attempts. Additionally, organizations should implement strict network segmentation to isolate WebAssembly runtime environments from public or untrusted networks. Incorporating vulnerability scanning and configuration management tools that check for this specific misconfiguration can prevent recurrence. Finally, ensure that incident response plans include procedures for addressing unauthorized access incidents related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T23:53:40.509Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68894505ad5a09ad00916e96

Added to database: 7/29/2025, 10:02:45 PM

Last enriched: 7/29/2025, 10:17:55 PM

Last updated: 8/1/2025, 5:23:38 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats