Skip to main content

CVE-2025-54126: CWE-668: Exposure of Resource to Wrong Sphere in bytecodealliance wasm-micro-runtime

Medium
VulnerabilityCVE-2025-54126cvecve-2025-54126cwe-668
Published: Tue Jul 29 2025 (07/29/2025, 21:52:36 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasm-micro-runtime

Description

The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.

AI-Powered Analysis

AILast updated: 08/06/2025, 01:06:25 UTC

Technical Analysis

CVE-2025-54126 is a medium-severity vulnerability affecting the WebAssembly Micro Runtime (WAMR), specifically its iwasm executable binary component. iwasm is built with the WAMR VMcore and supports the WebAssembly System Interface (WASI) along with a command line interface. The vulnerability exists in versions 2.4.0 and earlier, where the --addr-pool parameter accepts an IPv4 address without a subnet mask. This configuration flaw causes the system to interpret the address as allowing all incoming IP connections, effectively bypassing intended IP-based access restrictions. Consequently, services relying on --addr-pool to restrict access by IP address may unintentionally expose themselves to all external connections. This exposure can lead to unauthorized access to the service, particularly in production environments where users assume that specifying an IP address without a subnet mask defaults to a secure configuration. The root cause is classified under CWE-668, which relates to the exposure of resources to an incorrect sphere, meaning the resource is accessible beyond its intended scope. The issue was addressed and fixed in version 2.4.1 of wasm-micro-runtime. The CVSS 4.0 base score is 6.9, reflecting a network attack vector with low complexity, no privileges or user interaction required, and limited impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild.

Potential Impact

For European organizations using wasm-micro-runtime versions prior to 2.4.1, this vulnerability could lead to unauthorized external access to services that were presumed to be restricted by IP address. This exposure risks leakage of sensitive data or unauthorized use of the service, potentially leading to further exploitation or lateral movement within networks. Given the increasing adoption of WebAssembly runtimes in cloud-native, edge computing, and IoT environments, the vulnerability could impact sectors such as finance, healthcare, telecommunications, and critical infrastructure in Europe. Unauthorized access could undermine confidentiality and trust, and in regulated industries, may lead to compliance violations (e.g., GDPR) if personal data is exposed. The lack of requirement for authentication or user interaction makes exploitation easier for remote attackers scanning for vulnerable endpoints. However, the limited impact on integrity and availability reduces the likelihood of destructive attacks but does not eliminate the risk of data exposure or misuse.

Mitigation Recommendations

European organizations should immediately audit their deployments of wasm-micro-runtime, specifically the iwasm component, to identify versions below 2.4.1. They should upgrade all affected instances to version 2.4.1 or later, where the vulnerability is fixed. Until upgrades can be performed, organizations should avoid using the --addr-pool parameter without explicitly specifying a subnet mask to ensure proper IP filtering. Network-level controls such as firewall rules and intrusion prevention systems should be configured to restrict access to the affected services to trusted IP ranges. Additionally, organizations should implement monitoring and logging of access attempts to detect any unauthorized connection attempts. Security teams should review configuration management and deployment pipelines to prevent insecure defaults from being propagated. Finally, penetration testing and vulnerability scanning should include checks for this specific misconfiguration to proactively identify exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T23:53:40.509Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68894505ad5a09ad00916e96

Added to database: 7/29/2025, 10:02:45 PM

Last enriched: 8/6/2025, 1:06:25 AM

Last updated: 9/14/2025, 2:32:12 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats