CVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.
AI Analysis
Technical Summary
Wasmtime is a popular runtime for executing WebAssembly (Wasm) modules, supporting WASI (WebAssembly System Interface) host interfaces that allow guest modules to request system resources. CVE-2026-27204 identifies a vulnerability where Wasmtime versions prior to 24.0.6, 36.0.6, 40.0.4, and 41.0.4 do not impose adequate limits on resource allocations requested by guest Wasm modules. This lack of resource control enables a malicious or compromised guest to consume excessive CPU, memory, or other system resources on the host, leading to uncontrolled resource exhaustion. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), CWE-770 (Allocation of Resources Without Limits or Throttling), CWE-774 (Allocation of File Descriptors or Handles Without Limits or Throttling), and CWE-789 (Uncontrolled Memory Allocation). Although fixed versions have been released, the default configurations in these versions do not activate the resource limiting features to avoid breaking existing applications. Wasmtime 42.0.0 and later versions enable these protective limits by default. No known workarounds exist other than upgrading and configuring the runtime to enforce resource constraints. The vulnerability requires at least partial authentication and some user interaction, with a network attack vector, making exploitation feasible in scenarios where untrusted Wasm code is executed. There are no known exploits in the wild at this time.
Potential Impact
The primary impact of CVE-2026-27204 is denial of service caused by resource exhaustion on hosts running vulnerable Wasmtime versions. Organizations embedding Wasmtime to run WebAssembly modules, especially those executing untrusted or third-party code, face risks of service degradation or outages. This can affect cloud platforms, edge computing environments, serverless functions, and any infrastructure leveraging Wasmtime for Wasm execution. The uncontrolled resource consumption can lead to CPU spikes, memory exhaustion, or file descriptor depletion, potentially crashing the host process or causing system instability. This disrupts availability and may indirectly affect confidentiality and integrity if system failures lead to broader security issues. Given Wasmtime's growing adoption in cloud-native and edge scenarios, the vulnerability could impact a wide range of industries including technology providers, financial services, telecommunications, and government agencies. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation warrant prompt remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all Wasmtime deployments to version 42.0.0 or later, where resource limiting knobs are enabled by default. For environments unable to upgrade immediately, it is critical to manually configure Wasmtime embeddings to enforce strict resource limits on CPU, memory, and file descriptor usage for guest modules. Embedders should audit their Wasmtime configurations to ensure that resource consumption controls are active and properly tuned to their operational requirements. Additionally, restrict execution of untrusted or third-party WebAssembly modules unless absolutely necessary, and implement monitoring to detect abnormal resource usage patterns indicative of exploitation attempts. Employ runtime isolation techniques such as containerization or sandboxing to limit the impact of resource exhaustion on the broader system. Regularly review Wasmtime release notes and security advisories for updates or additional mitigations. Since no workarounds exist without upgrading, prioritizing timely patching is essential.
Affected Countries
United States, Germany, Japan, United Kingdom, France, South Korea, Canada, Australia, Netherlands, Singapore
CVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime
Description
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Wasmtime is a popular runtime for executing WebAssembly (Wasm) modules, supporting WASI (WebAssembly System Interface) host interfaces that allow guest modules to request system resources. CVE-2026-27204 identifies a vulnerability where Wasmtime versions prior to 24.0.6, 36.0.6, 40.0.4, and 41.0.4 do not impose adequate limits on resource allocations requested by guest Wasm modules. This lack of resource control enables a malicious or compromised guest to consume excessive CPU, memory, or other system resources on the host, leading to uncontrolled resource exhaustion. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), CWE-770 (Allocation of Resources Without Limits or Throttling), CWE-774 (Allocation of File Descriptors or Handles Without Limits or Throttling), and CWE-789 (Uncontrolled Memory Allocation). Although fixed versions have been released, the default configurations in these versions do not activate the resource limiting features to avoid breaking existing applications. Wasmtime 42.0.0 and later versions enable these protective limits by default. No known workarounds exist other than upgrading and configuring the runtime to enforce resource constraints. The vulnerability requires at least partial authentication and some user interaction, with a network attack vector, making exploitation feasible in scenarios where untrusted Wasm code is executed. There are no known exploits in the wild at this time.
Potential Impact
The primary impact of CVE-2026-27204 is denial of service caused by resource exhaustion on hosts running vulnerable Wasmtime versions. Organizations embedding Wasmtime to run WebAssembly modules, especially those executing untrusted or third-party code, face risks of service degradation or outages. This can affect cloud platforms, edge computing environments, serverless functions, and any infrastructure leveraging Wasmtime for Wasm execution. The uncontrolled resource consumption can lead to CPU spikes, memory exhaustion, or file descriptor depletion, potentially crashing the host process or causing system instability. This disrupts availability and may indirectly affect confidentiality and integrity if system failures lead to broader security issues. Given Wasmtime's growing adoption in cloud-native and edge scenarios, the vulnerability could impact a wide range of industries including technology providers, financial services, telecommunications, and government agencies. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation warrant prompt remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all Wasmtime deployments to version 42.0.0 or later, where resource limiting knobs are enabled by default. For environments unable to upgrade immediately, it is critical to manually configure Wasmtime embeddings to enforce strict resource limits on CPU, memory, and file descriptor usage for guest modules. Embedders should audit their Wasmtime configurations to ensure that resource consumption controls are active and properly tuned to their operational requirements. Additionally, restrict execution of untrusted or third-party WebAssembly modules unless absolutely necessary, and implement monitoring to detect abnormal resource usage patterns indicative of exploitation attempts. Employ runtime isolation techniques such as containerization or sandboxing to limit the impact of resource exhaustion on the broader system. Regularly review Wasmtime release notes and security advisories for updates or additional mitigations. Since no workarounds exist without upgrading, prioritizing timely patching is essential.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-18T19:47:02.155Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e1b0db7ef31ef0b464b82
Added to database: 2/24/2026, 9:41:33 PM
Last enriched: 3/4/2026, 6:49:12 PM
Last updated: 4/10/2026, 10:14:31 PM
Views: 152
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.