Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime

0
Medium
Published: Tue Feb 24 2026 (02/24/2026, 21:23:47 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasmtime

Description

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:49:12 UTC

Technical Analysis

Wasmtime is a popular runtime for executing WebAssembly (Wasm) modules, supporting WASI (WebAssembly System Interface) host interfaces that allow guest modules to request system resources. CVE-2026-27204 identifies a vulnerability where Wasmtime versions prior to 24.0.6, 36.0.6, 40.0.4, and 41.0.4 do not impose adequate limits on resource allocations requested by guest Wasm modules. This lack of resource control enables a malicious or compromised guest to consume excessive CPU, memory, or other system resources on the host, leading to uncontrolled resource exhaustion. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), CWE-770 (Allocation of Resources Without Limits or Throttling), CWE-774 (Allocation of File Descriptors or Handles Without Limits or Throttling), and CWE-789 (Uncontrolled Memory Allocation). Although fixed versions have been released, the default configurations in these versions do not activate the resource limiting features to avoid breaking existing applications. Wasmtime 42.0.0 and later versions enable these protective limits by default. No known workarounds exist other than upgrading and configuring the runtime to enforce resource constraints. The vulnerability requires at least partial authentication and some user interaction, with a network attack vector, making exploitation feasible in scenarios where untrusted Wasm code is executed. There are no known exploits in the wild at this time.

Potential Impact

The primary impact of CVE-2026-27204 is denial of service caused by resource exhaustion on hosts running vulnerable Wasmtime versions. Organizations embedding Wasmtime to run WebAssembly modules, especially those executing untrusted or third-party code, face risks of service degradation or outages. This can affect cloud platforms, edge computing environments, serverless functions, and any infrastructure leveraging Wasmtime for Wasm execution. The uncontrolled resource consumption can lead to CPU spikes, memory exhaustion, or file descriptor depletion, potentially crashing the host process or causing system instability. This disrupts availability and may indirectly affect confidentiality and integrity if system failures lead to broader security issues. Given Wasmtime's growing adoption in cloud-native and edge scenarios, the vulnerability could impact a wide range of industries including technology providers, financial services, telecommunications, and government agencies. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation warrant prompt remediation to prevent potential attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all Wasmtime deployments to version 42.0.0 or later, where resource limiting knobs are enabled by default. For environments unable to upgrade immediately, it is critical to manually configure Wasmtime embeddings to enforce strict resource limits on CPU, memory, and file descriptor usage for guest modules. Embedders should audit their Wasmtime configurations to ensure that resource consumption controls are active and properly tuned to their operational requirements. Additionally, restrict execution of untrusted or third-party WebAssembly modules unless absolutely necessary, and implement monitoring to detect abnormal resource usage patterns indicative of exploitation attempts. Employ runtime isolation techniques such as containerization or sandboxing to limit the impact of resource exhaustion on the broader system. Regularly review Wasmtime release notes and security advisories for updates or additional mitigations. Since no workarounds exist without upgrading, prioritizing timely patching is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.155Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e1b0db7ef31ef0b464b82

Added to database: 2/24/2026, 9:41:33 PM

Last enriched: 3/4/2026, 6:49:12 PM

Last updated: 4/10/2026, 10:14:31 PM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses