CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.
AI Analysis
Technical Summary
The vulnerability CVE-2025-64713 affects the bytecodealliance's wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used in embedded and edge computing environments. The issue arises in versions prior to 2.4.4 within the fast interpreter mode during WASM bytecode loading. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach capacity and a GET_GLOBAL(I32) opcode is processed, only frame_ref_bottom is expanded while frame_offset_bottom is not. If this is immediately followed by an if opcode triggering preserve_local_for_block, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded accordingly, this results in an out-of-bounds access to frame_offset_bottom, causing memory corruption. This vulnerability is categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). Exploitation requires local access with high attack complexity and no user interaction, and it primarily impacts availability by potentially causing crashes or denial of service. The issue has been addressed in WAMR version 2.4.4, which properly expands both arrays to prevent out-of-bounds access.
Potential Impact
The primary impact of CVE-2025-64713 is on availability, as the out-of-bounds memory access can lead to crashes or denial of service in applications using vulnerable versions of WAMR. For European organizations, especially those deploying WAMR in embedded systems, IoT devices, or edge computing platforms, this could disrupt critical services or device operations. While confidentiality and integrity are not directly compromised, the resulting instability could indirectly affect system reliability and operational continuity. Organizations in sectors relying heavily on embedded WebAssembly runtimes—such as manufacturing automation, telecommunications, and smart infrastructure—may face increased operational risks. Additionally, remediation efforts and downtime for patching could impact business continuity if not managed proactively.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the issue has been patched. For environments where immediate upgrading is not feasible, consider implementing strict input validation and sandboxing to limit the execution of untrusted WASM bytecode. Conduct thorough testing of embedded and edge devices to detect abnormal crashes or behavior indicative of exploitation attempts. Employ runtime monitoring and anomaly detection tools tailored for embedded systems to identify potential exploitation. Additionally, restrict local access to systems running WAMR to trusted personnel only, as exploitation requires local access with high complexity. Maintain an inventory of devices and applications using WAMR to ensure comprehensive patch management and vulnerability tracking.
Affected Countries
Germany, Netherlands, France, United Kingdom, Sweden
CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime
Description
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-64713 affects the bytecodealliance's wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used in embedded and edge computing environments. The issue arises in versions prior to 2.4.4 within the fast interpreter mode during WASM bytecode loading. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach capacity and a GET_GLOBAL(I32) opcode is processed, only frame_ref_bottom is expanded while frame_offset_bottom is not. If this is immediately followed by an if opcode triggering preserve_local_for_block, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded accordingly, this results in an out-of-bounds access to frame_offset_bottom, causing memory corruption. This vulnerability is categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). Exploitation requires local access with high attack complexity and no user interaction, and it primarily impacts availability by potentially causing crashes or denial of service. The issue has been addressed in WAMR version 2.4.4, which properly expands both arrays to prevent out-of-bounds access.
Potential Impact
The primary impact of CVE-2025-64713 is on availability, as the out-of-bounds memory access can lead to crashes or denial of service in applications using vulnerable versions of WAMR. For European organizations, especially those deploying WAMR in embedded systems, IoT devices, or edge computing platforms, this could disrupt critical services or device operations. While confidentiality and integrity are not directly compromised, the resulting instability could indirectly affect system reliability and operational continuity. Organizations in sectors relying heavily on embedded WebAssembly runtimes—such as manufacturing automation, telecommunications, and smart infrastructure—may face increased operational risks. Additionally, remediation efforts and downtime for patching could impact business continuity if not managed proactively.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the issue has been patched. For environments where immediate upgrading is not feasible, consider implementing strict input validation and sandboxing to limit the execution of untrusted WASM bytecode. Conduct thorough testing of embedded and edge devices to detect abnormal crashes or behavior indicative of exploitation attempts. Employ runtime monitoring and anomaly detection tools tailored for embedded systems to identify potential exploitation. Additionally, restrict local access to systems running WAMR to trusted personnel only, as exploitation requires local access with high complexity. Maintain an inventory of devices and applications using WAMR to ensure comprehensive patch management and vulnerability tracking.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.921Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69262ac94ed5c2dbbb0fc281
Added to database: 11/25/2025, 10:16:41 PM
Last enriched: 12/2/2025, 10:40:06 PM
Last updated: 1/10/2026, 10:16:10 PM
Views: 94
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.