Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64713: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in bytecodealliance wasm-micro-runtime

0
Medium
VulnerabilityCVE-2025-64713cvecve-2025-64713cwe-119
Published: Tue Nov 25 2025 (11/25/2025, 22:13:47 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasm-micro-runtime

Description

WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.

AI-Powered Analysis

AILast updated: 11/25/2025, 22:32:20 UTC

Technical Analysis

The vulnerability CVE-2025-64713 affects the bytecodealliance wasm-micro-runtime (WAMR), a lightweight standalone WebAssembly runtime used for executing WASM bytecode in constrained environments. The flaw exists in versions prior to 2.4.4 within the fast interpreter mode during the loading of WASM bytecode. Specifically, when the internal arrays frame_ref_bottom and frame_offset_bottom reach their capacity and a GET_GLOBAL(I32) opcode is processed, frame_ref_bottom is expanded but frame_offset_bottom may not be correspondingly expanded. If this is immediately followed by an if opcode that triggers the preserve_local_for_block function, the runtime traverses these arrays using stack_cell_num as the upper bound. Because frame_offset_bottom was not expanded, this traversal causes an out-of-bounds access, leading to memory corruption. This is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The vulnerability can cause a denial of service by crashing the runtime or corrupting memory, but it does not allow for privilege escalation or data leakage. Exploitation requires local access to the runtime environment and has a high attack complexity, with no user interaction needed. The issue was addressed and patched in version 2.4.4 of WAMR. No public exploits have been reported to date.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial of service in applications relying on WAMR for WebAssembly execution, particularly in embedded, IoT, or edge computing scenarios where WAMR is favored for its lightweight footprint. Service interruptions could affect critical infrastructure or industrial control systems that utilize WASM runtimes for automation or processing tasks. Although the vulnerability does not compromise confidentiality or integrity, availability disruptions can lead to operational downtime and associated financial or safety risks. Organizations with deployments in manufacturing, automotive, telecommunications, or smart city applications may be particularly vulnerable. The requirement for local access and high attack complexity somewhat limits the risk of remote exploitation, but insider threats or compromised local systems could leverage this flaw. The absence of known exploits reduces immediate risk but underscores the importance of timely patching to prevent future attacks.

Mitigation Recommendations

The most effective mitigation is to upgrade all instances of wasm-micro-runtime to version 2.4.4 or later, where the out-of-bounds access issue has been fixed. Organizations should conduct an inventory of systems using WAMR, especially in embedded and edge environments, to ensure no vulnerable versions remain in production. For environments where immediate upgrading is not feasible, implementing strict access controls to limit local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring runtime logs and system behavior for crashes or anomalies related to WASM execution can help detect attempted exploitation. Security teams should also review and harden the supply chain and deployment pipelines for WASM modules to prevent injection of malicious bytecode sequences that could trigger the vulnerability. Finally, integrating memory safety tools or runtime protections where possible can provide additional defense-in-depth.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69262ac94ed5c2dbbb0fc281

Added to database: 11/25/2025, 10:16:41 PM

Last enriched: 11/25/2025, 10:32:20 PM

Last updated: 11/26/2025, 1:02:42 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats