CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.
AI Analysis
Technical Summary
The vulnerability CVE-2025-64713 affects the bytecodealliance wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used for executing WASM bytecode in constrained environments. The flaw exists in versions prior to 2.4.4 within the fast interpreter mode during the loading of WASM bytecode. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach their capacity and a GET_GLOBAL(I32) opcode is processed, frame_ref_bottom is expanded but frame_offset_bottom may not be correspondingly expanded. If this is immediately followed by an if opcode that triggers the preserve_local_for_block function, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded, this traversal causes an out-of-bounds access, leading to memory corruption. This is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability can cause a denial of service by crashing the runtime or corrupting memory, but it does not allow for privilege escalation or data leakage. Exploitation requires local access to the runtime environment and has a high attack complexity, with no user interaction needed. The issue was addressed and patched in version 2.4.4 of WAMR. No public exploits have been reported to date.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service in applications relying on WAMR for WebAssembly execution, particularly in embedded, IoT, or edge computing scenarios where WAMR is favored for its lightweight footprint. Service interruptions could affect critical infrastructure or industrial control systems that utilize WASM runtimes for automation or processing tasks. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can lead to operational downtime and associated financial or safety risks. Organizations with deployments in manufacturing, automotive, telecommunications, or smart city applications may be particularly vulnerable. The requirement for local access and high attack complexity somewhat limits the risk of remote exploitation, but insider threats or compromised local systems could leverage this flaw. The absence of known exploits reduces immediate risk but underscores the importance of timely patching to prevent future attacks.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the out-of-bounds access issue has been fixed. Organizations should conduct an inventory of systems using WAMR, especially in embedded and edge environments, to ensure no vulnerable versions remain in production. For environments where immediate upgrading is not feasible, implementing strict access controls to limit local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring runtime logs and system behavior for crashes or anomalies related to WASM execution can help detect attempted exploitation. Security teams should also review and harden the supply chain and deployment pipelines for WASM modules to prevent injection of malicious bytecode sequences that could trigger the vulnerability. Finally, integrating memory safety tools or runtime protections where possible can provide additional defense-in-depth.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime
Description
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-64713 affects the bytecodealliance wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used for executing WASM bytecode in constrained environments. The flaw exists in versions prior to 2.4.4 within the fast interpreter mode during the loading of WASM bytecode. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach their capacity and a GET_GLOBAL(I32) opcode is processed, frame_ref_bottom is expanded but frame_offset_bottom may not be correspondingly expanded. If this is immediately followed by an if opcode that triggers the preserve_local_for_block function, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded, this traversal causes an out-of-bounds access, leading to memory corruption. This is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability can cause a denial of service by crashing the runtime or corrupting memory, but it does not allow for privilege escalation or data leakage. Exploitation requires local access to the runtime environment and has a high attack complexity, with no user interaction needed. The issue was addressed and patched in version 2.4.4 of WAMR. No public exploits have been reported to date.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential for denial of service in applications relying on WAMR for WebAssembly execution, particularly in embedded, IoT, or edge computing scenarios where WAMR is favored for its lightweight footprint. Service interruptions could affect critical infrastructure or industrial control systems that utilize WASM runtimes for automation or processing tasks. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can lead to operational downtime and associated financial or safety risks. Organizations with deployments in manufacturing, automotive, telecommunications, or smart city applications may be particularly vulnerable. The requirement for local access and high attack complexity somewhat limits the risk of remote exploitation, but insider threats or compromised local systems could leverage this flaw. The absence of known exploits reduces immediate risk but underscores the importance of timely patching to prevent future attacks.
Mitigation Recommendations
The most effective mitigation is to upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the out-of-bounds access issue has been fixed. Organizations should conduct an inventory of systems using WAMR, especially in embedded and edge environments, to ensure no vulnerable versions remain in production. For environments where immediate upgrading is not feasible, implementing strict access controls to limit local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring runtime logs and system behavior for crashes or anomalies related to WASM execution can help detect attempted exploitation. Security teams should also review and harden the supply chain and deployment pipelines for WASM modules to prevent injection of malicious bytecode sequences that could trigger the vulnerability. Finally, integrating memory safety tools or runtime protections where possible can provide additional defense-in-depth.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.921Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69262ac94ed5c2dbbb0fc281
Added to database: 11/25/2025, 10:16:41 PM
Last enriched: 11/25/2025, 10:32:20 PM
Last updated: 11/26/2025, 1:02:42 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65957: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Intercore-Productions Core-Bot
HighCVE-2025-64657: CWE-121: Stack-based Buffer Overflow in Microsoft Azure App Gateway
CriticalCVE-2025-64656: CWE-125: Out-of-bounds Read in Microsoft Azure App Gateway
CriticalRussian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City
MediumCVE-2025-66019: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.