CVE-2025-58749: CWE-822: Untrusted Pointer Dereference in bytecodealliance wasm-micro-runtime
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. In WAMR versions prior to 2.4.2, when running in LLVM-JIT mode, the runtime cannot exit normally when executing WebAssembly programs containing a memory.fill instruction where the first operand (memory address pointer) is greater than or equal to 2147483648 bytes (2GiB). This causes the runtime to hang in release builds or crash in debug builds due to accessing an invalid pointer. The issue does not occur in FAST-JIT mode or other runtime tools. This has been fixed in version 2.4.2.
AI Analysis
Technical Summary
CVE-2025-58749 is a vulnerability identified in the WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime for executing WebAssembly (Wasm) programs. The issue affects versions of WAMR prior to 2.4.2 when operating in LLVM-JIT mode. Specifically, the vulnerability arises when executing WebAssembly programs containing the memory.fill instruction, where the first operand, a memory address pointer, is equal to or exceeds 2 GiB (2147483648 bytes). Under these conditions, the runtime fails to exit normally. In release builds, this results in the runtime hanging indefinitely, while in debug builds, it causes a crash due to dereferencing an invalid pointer. This behavior is attributed to an untrusted pointer dereference (CWE-822) and an integer overflow or related issue (CWE-190) in handling the memory address operand. Notably, this problem does not manifest when WAMR is running in FAST-JIT mode or when using other runtime tools, limiting the scope of the vulnerability to LLVM-JIT mode only. The issue has been addressed and fixed in version 2.4.2 of WAMR. The CVSS 4.0 base score is 2.1, indicating a low severity vulnerability, with an attack vector of local (AV:L), low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on availability (VA:L) but no impact on confidentiality or integrity. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations utilizing WAMR in LLVM-JIT mode, this vulnerability could lead to denial-of-service conditions where the runtime hangs or crashes upon processing crafted WebAssembly modules containing the problematic memory.fill instruction with large memory pointers. Although the severity is low and the attack vector is local, the impact could disrupt services or applications relying on WAMR for Wasm execution, particularly in development, testing, or embedded environments where LLVM-JIT mode is preferred. Since the vulnerability does not compromise confidentiality or integrity, the primary risk is operational disruption. Organizations deploying WAMR in production environments with automated or unattended Wasm execution workflows may experience service interruptions or require manual intervention to recover from hangs or crashes. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering by malformed Wasm modules. Given the increasing adoption of WebAssembly for edge computing, IoT, and cloud-native applications in Europe, this vulnerability could affect critical infrastructure components if WAMR is used without timely updates.
Mitigation Recommendations
European organizations should prioritize upgrading WAMR to version 2.4.2 or later, where this vulnerability is fixed. For environments where immediate upgrade is not feasible, consider disabling LLVM-JIT mode and switching to FAST-JIT mode or other runtime tools that are not affected by this issue. Implement strict input validation and sandboxing for WebAssembly modules to prevent execution of untrusted or malformed Wasm code that could trigger the vulnerability. Monitoring runtime behavior for hangs or crashes can help detect exploitation attempts or accidental triggers. Additionally, integrate WAMR runtime updates into regular patch management cycles and conduct security testing of Wasm modules before deployment. For developers, avoid generating Wasm code that uses memory.fill instructions with large memory pointers in LLVM-JIT mode until the runtime is updated. Finally, maintain awareness of vendor advisories and community reports for any emerging exploits or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Estonia
CVE-2025-58749: CWE-822: Untrusted Pointer Dereference in bytecodealliance wasm-micro-runtime
Description
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. In WAMR versions prior to 2.4.2, when running in LLVM-JIT mode, the runtime cannot exit normally when executing WebAssembly programs containing a memory.fill instruction where the first operand (memory address pointer) is greater than or equal to 2147483648 bytes (2GiB). This causes the runtime to hang in release builds or crash in debug builds due to accessing an invalid pointer. The issue does not occur in FAST-JIT mode or other runtime tools. This has been fixed in version 2.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-58749 is a vulnerability identified in the WebAssembly Micro Runtime (WAMR), a lightweight standalone runtime for executing WebAssembly (Wasm) programs. The issue affects versions of WAMR prior to 2.4.2 when operating in LLVM-JIT mode. Specifically, the vulnerability arises when executing WebAssembly programs containing the memory.fill instruction, where the first operand, a memory address pointer, is equal to or exceeds 2 GiB (2147483648 bytes). Under these conditions, the runtime fails to exit normally. In release builds, this results in the runtime hanging indefinitely, while in debug builds, it causes a crash due to dereferencing an invalid pointer. This behavior is attributed to an untrusted pointer dereference (CWE-822) and an integer overflow or related issue (CWE-190) in handling the memory address operand. Notably, this problem does not manifest when WAMR is running in FAST-JIT mode or when using other runtime tools, limiting the scope of the vulnerability to LLVM-JIT mode only. The issue has been addressed and fixed in version 2.4.2 of WAMR. The CVSS 4.0 base score is 2.1, indicating a low severity vulnerability, with an attack vector of local (AV:L), low complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on availability (VA:L) but no impact on confidentiality or integrity. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations utilizing WAMR in LLVM-JIT mode, this vulnerability could lead to denial-of-service conditions where the runtime hangs or crashes upon processing crafted WebAssembly modules containing the problematic memory.fill instruction with large memory pointers. Although the severity is low and the attack vector is local, the impact could disrupt services or applications relying on WAMR for Wasm execution, particularly in development, testing, or embedded environments where LLVM-JIT mode is preferred. Since the vulnerability does not compromise confidentiality or integrity, the primary risk is operational disruption. Organizations deploying WAMR in production environments with automated or unattended Wasm execution workflows may experience service interruptions or require manual intervention to recover from hangs or crashes. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering by malformed Wasm modules. Given the increasing adoption of WebAssembly for edge computing, IoT, and cloud-native applications in Europe, this vulnerability could affect critical infrastructure components if WAMR is used without timely updates.
Mitigation Recommendations
European organizations should prioritize upgrading WAMR to version 2.4.2 or later, where this vulnerability is fixed. For environments where immediate upgrade is not feasible, consider disabling LLVM-JIT mode and switching to FAST-JIT mode or other runtime tools that are not affected by this issue. Implement strict input validation and sandboxing for WebAssembly modules to prevent execution of untrusted or malformed Wasm code that could trigger the vulnerability. Monitoring runtime behavior for hangs or crashes can help detect exploitation attempts or accidental triggers. Additionally, integrate WAMR runtime updates into regular patch management cycles and conduct security testing of Wasm modules before deployment. For developers, avoid generating Wasm code that uses memory.fill instructions with large memory pointers in LLVM-JIT mode until the runtime is updated. Finally, maintain awareness of vendor advisories and community reports for any emerging exploits or related vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-04T19:18:09.498Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c9896e330108e524b3d351
Added to database: 9/16/2025, 3:59:42 PM
Last enriched: 9/16/2025, 4:00:03 PM
Last updated: 9/19/2025, 1:01:55 AM
Views: 11
Related Threats
CVE-2025-7403: Write-what-where Condition in zephyrproject-rtos Zephyr
HighCVE-2025-10458: Improper Handling of Length Parameter Inconsistency in zephyrproject-rtos Zephyr
HighCVE-2025-10457: Improperly Implemented Security Check for Standard in zephyrproject-rtos Zephyr
MediumCVE-2025-8487: CWE-862 Missing Authorization in extendthemes Kubio AI Page Builder
MediumCVE-2025-59717: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in DigitalOcean @digitalocean/do-markdownit
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.