Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime

0
Medium
VulnerabilityCVE-2025-64713cvecve-2025-64713cwe-119
Published: Tue Nov 25 2025 (11/25/2025, 22:13:47 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasm-micro-runtime

Description

WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.

AI-Powered Analysis

AILast updated: 12/02/2025, 22:40:06 UTC

Technical Analysis

The vulnerability CVE-2025-64713 affects the bytecodealliance's wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used in embedded and edge computing environments. The issue arises in versions prior to 2.4.4 within the fast interpreter mode during WASM bytecode loading. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach capacity and a GET_GLOBAL(I32) opcode is processed, only frame_ref_bottom is expanded while frame_offset_bottom is not. If this is immediately followed by an if opcode triggering preserve_local_for_block, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded accordingly, this results in an out-of-bounds access to frame_offset_bottom, causing memory corruption. This vulnerability is categorized under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). Exploitation requires local access with high attack complexity and no user interaction, and it primarily impacts availability by potentially causing crashes or denial of service. The issue has been addressed in WAMR version 2.4.4, which properly expands both arrays to prevent out-of-bounds access.

Potential Impact

The primary impact of CVE-2025-64713 is on availability, as the out-of-bounds memory access can lead to crashes or denial of service in applications using vulnerable versions of WAMR. For European organizations, especially those deploying WAMR in embedded systems, IoT devices, or edge computing platforms, this could disrupt critical services or device operations. While confidentiality and integrity are not directly compromised, the resulting instability could indirectly affect system reliability and operational continuity. Organizations in sectors relying heavily on embedded WebAssembly runtimes—such as manufacturing automation, telecommunications, and smart infrastructure—may face increased operational risks. Additionally, remediation efforts and downtime for patching could impact business continuity if not managed proactively.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the issue has been patched. For environments where immediate upgrading is not feasible, consider implementing strict input validation and sandboxing to limit the execution of untrusted WASM bytecode. Conduct thorough testing of embedded and edge devices to detect abnormal crashes or behavior indicative of exploitation attempts. Employ runtime monitoring and anomaly detection tools tailored for embedded systems to identify potential exploitation. Additionally, restrict local access to systems running WAMR to trusted personnel only, as exploitation requires local access with high complexity. Maintain an inventory of devices and applications using WAMR to ensure comprehensive patch management and vulnerability tracking.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69262ac94ed5c2dbbb0fc281

Added to database: 11/25/2025, 10:16:41 PM

Last enriched: 12/2/2025, 10:40:06 PM

Last updated: 1/10/2026, 10:16:10 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats