CVE-2025-54126: CWE-668: Exposure of Resource to Wrong Sphere in bytecodealliance wasm-micro-runtime
The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.
AI Analysis
Technical Summary
CVE-2025-54126 is a medium-severity vulnerability affecting the WebAssembly Micro Runtime (WAMR), specifically its iwasm executable binary component. WAMR is a lightweight WebAssembly runtime that supports the WebAssembly System Interface (WASI) and command line interface, enabling execution of WebAssembly modules in various environments. The vulnerability exists in versions 2.4.0 and earlier, where the iwasm component uses the --addr-pool parameter with an IPv4 address that lacks a subnet mask. This configuration flaw causes the system to accept connections from all IP addresses rather than restricting access to a specific IP range as intended. The absence of a subnet mask means that the access control mechanism is effectively bypassed, exposing the service to all incoming network connections. This exposure can lead to unauthorized access to services that rely on --addr-pool for IP-based access control, especially in production deployments where administrators may incorrectly assume that specifying an IP address without a subnet mask is secure by default. The vulnerability is categorized under CWE-668 (Exposure of Resource to Wrong Sphere), indicating improper access control boundaries. The issue is resolved in WAMR version 2.4.1, where the handling of --addr-pool has been corrected to enforce proper subnet masking and restrict access as configured. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network exploitable conditions without authentication or user interaction, but with limited impact on confidentiality, integrity, or availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations deploying WAMR, especially those using the iwasm component in production environments, this vulnerability poses a risk of unauthorized external access to services that were intended to be restricted by IP address. This could lead to exposure of sensitive internal WebAssembly workloads or services, potentially allowing attackers to execute unauthorized code or access data. The impact is particularly relevant for sectors relying on WebAssembly for edge computing, IoT gateways, or cloud-native applications, where WAMR is used to run lightweight, sandboxed modules. Unauthorized access could undermine confidentiality and operational security, though the vulnerability does not directly enable privilege escalation or code execution beyond the exposed service. European organizations with strict data protection requirements (e.g., GDPR) must consider the risk of data exposure or breach resulting from this vulnerability. Additionally, the inadvertent exposure could serve as a foothold for further attacks if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the ease of exploitation (no authentication or user interaction required) increases the urgency of remediation in sensitive environments.
Mitigation Recommendations
European organizations should promptly upgrade WAMR to version 2.4.1 or later, where the vulnerability is fixed by enforcing proper subnet mask handling in the --addr-pool parameter. Until upgrade is possible, organizations should avoid using the --addr-pool option without explicitly specifying a subnet mask to ensure access restrictions are correctly applied. Network-level controls such as firewalls and intrusion prevention systems should be configured to restrict access to the iwasm service only to trusted IP ranges, effectively compensating for the runtime's misconfiguration. Conduct thorough audits of deployment configurations to identify any instances where --addr-pool is used without subnet masks and remediate accordingly. Monitoring network traffic for unexpected connections to the iwasm service can help detect potential exploitation attempts. Additionally, organizations should implement strict network segmentation to isolate WebAssembly runtime environments from public or untrusted networks. Incorporating vulnerability scanning and configuration management tools that check for this specific misconfiguration can prevent recurrence. Finally, ensure that incident response plans include procedures for addressing unauthorized access incidents related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2025-54126: CWE-668: Exposure of Resource to Wrong Sphere in bytecodealliance wasm-micro-runtime
Description
The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-54126 is a medium-severity vulnerability affecting the WebAssembly Micro Runtime (WAMR), specifically its iwasm executable binary component. WAMR is a lightweight WebAssembly runtime that supports the WebAssembly System Interface (WASI) and command line interface, enabling execution of WebAssembly modules in various environments. The vulnerability exists in versions 2.4.0 and earlier, where the iwasm component uses the --addr-pool parameter with an IPv4 address that lacks a subnet mask. This configuration flaw causes the system to accept connections from all IP addresses rather than restricting access to a specific IP range as intended. The absence of a subnet mask means that the access control mechanism is effectively bypassed, exposing the service to all incoming network connections. This exposure can lead to unauthorized access to services that rely on --addr-pool for IP-based access control, especially in production deployments where administrators may incorrectly assume that specifying an IP address without a subnet mask is secure by default. The vulnerability is categorized under CWE-668 (Exposure of Resource to Wrong Sphere), indicating improper access control boundaries. The issue is resolved in WAMR version 2.4.1, where the handling of --addr-pool has been corrected to enforce proper subnet masking and restrict access as configured. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network exploitable conditions without authentication or user interaction, but with limited impact on confidentiality, integrity, or availability. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations deploying WAMR, especially those using the iwasm component in production environments, this vulnerability poses a risk of unauthorized external access to services that were intended to be restricted by IP address. This could lead to exposure of sensitive internal WebAssembly workloads or services, potentially allowing attackers to execute unauthorized code or access data. The impact is particularly relevant for sectors relying on WebAssembly for edge computing, IoT gateways, or cloud-native applications, where WAMR is used to run lightweight, sandboxed modules. Unauthorized access could undermine confidentiality and operational security, though the vulnerability does not directly enable privilege escalation or code execution beyond the exposed service. European organizations with strict data protection requirements (e.g., GDPR) must consider the risk of data exposure or breach resulting from this vulnerability. Additionally, the inadvertent exposure could serve as a foothold for further attacks if combined with other vulnerabilities. The medium severity rating suggests a moderate risk, but the ease of exploitation (no authentication or user interaction required) increases the urgency of remediation in sensitive environments.
Mitigation Recommendations
European organizations should promptly upgrade WAMR to version 2.4.1 or later, where the vulnerability is fixed by enforcing proper subnet mask handling in the --addr-pool parameter. Until upgrade is possible, organizations should avoid using the --addr-pool option without explicitly specifying a subnet mask to ensure access restrictions are correctly applied. Network-level controls such as firewalls and intrusion prevention systems should be configured to restrict access to the iwasm service only to trusted IP ranges, effectively compensating for the runtime's misconfiguration. Conduct thorough audits of deployment configurations to identify any instances where --addr-pool is used without subnet masks and remediate accordingly. Monitoring network traffic for unexpected connections to the iwasm service can help detect potential exploitation attempts. Additionally, organizations should implement strict network segmentation to isolate WebAssembly runtime environments from public or untrusted networks. Incorporating vulnerability scanning and configuration management tools that check for this specific misconfiguration can prevent recurrence. Finally, ensure that incident response plans include procedures for addressing unauthorized access incidents related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-16T23:53:40.509Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68894505ad5a09ad00916e96
Added to database: 7/29/2025, 10:02:45 PM
Last enriched: 7/29/2025, 10:17:55 PM
Last updated: 8/1/2025, 5:23:38 AM
Views: 8
Related Threats
CVE-2025-8437: SQL Injection in code-projects Kitchen Treasure
MediumCVE-2025-8454: Vulnerability in Debian devscripts
HighCVE-2025-5921: CWE-79 Cross-Site Scripting (XSS) in SureForms
HighCVE-2025-31716: cwe-121 Stack-based Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000
MediumCVE-2025-8436: SQL Injection in projectworlds Online Admission System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.