Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27204: CWE-400: Uncontrolled Resource Consumption in bytecodealliance wasmtime

0
Medium
Published: Tue Feb 24 2026 (02/24/2026, 21:23:47 UTC)
Source: CVE Database V5
Vendor/Project: bytecodealliance
Product: wasmtime

Description

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.

AI-Powered Analysis

AILast updated: 02/24/2026, 21:56:09 UTC

Technical Analysis

Wasmtime is a runtime environment for executing WebAssembly (WASM) modules, providing WASI (WebAssembly System Interface) host interfaces that allow guest modules to interact with host system resources. CVE-2026-27204 identifies a vulnerability where Wasmtime versions prior to 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 do not adequately restrict resource allocations requested by guest WASM modules. This lack of proper resource management enables guest modules to request excessive resources, leading to uncontrolled resource consumption on the host system. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption) and related CWEs (CWE-770, CWE-774, CWE-789) that describe improper handling of resource allocation and limits. The issue manifests as a Denial of Service (DoS) vector, where a malicious or compromised guest module can exhaust CPU, memory, or other critical resources, causing the host to degrade or crash. Although fixed versions have been released, the default configurations do not enable the resource limiting knobs to maintain backward compatibility, so embedders must explicitly enable these protections. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk in environments where untrusted or semi-trusted WASM modules are executed. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on availability without affecting confidentiality or integrity.

Potential Impact

The primary impact of this vulnerability is Denial of Service (DoS) through resource exhaustion on hosts running vulnerable Wasmtime versions. Organizations embedding Wasmtime to run WebAssembly modules—especially those accepting untrusted or third-party WASM code—face risks of service disruption, degraded performance, or crashes. This can affect cloud providers, edge computing platforms, serverless environments, and any software leveraging Wasmtime for sandboxed execution. The availability impact can cascade to dependent services and users, potentially causing downtime and operational losses. Since confidentiality and integrity are not directly impacted, data breaches or unauthorized modifications are unlikely from this vulnerability alone. However, DoS conditions can be exploited as part of multi-stage attacks or to distract defenders. The lack of default protective configurations in fixed versions means organizations must proactively configure resource limits to fully mitigate the risk. Failure to do so leaves systems vulnerable despite running patched versions.

Mitigation Recommendations

To mitigate CVE-2026-27204, organizations should upgrade Wasmtime to version 24.0.6, 36.0.6, 40.0.4, 41.0.4, 42.0.0 or later. After upgrading, embedders must explicitly enable and tune resource limiting knobs provided by Wasmtime to enforce strict caps on CPU, memory, and other resource usage by guest WASM modules. This includes configuring maximum memory allocation, CPU time quotas, and other relevant limits based on the deployment context and expected workload. Embedders should audit their embedding configurations to ensure these limits are active and tested under realistic load scenarios. Monitoring resource usage and setting alerts for abnormal consumption patterns can help detect exploitation attempts early. Additionally, restricting the execution of untrusted or unknown WASM modules and applying network-level protections can reduce exposure. Since no workarounds exist without upgrading, timely patching combined with configuration hardening is critical. Developers should also stay informed about Wasmtime updates and security advisories to apply future fixes promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.155Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e1b0db7ef31ef0b464b82

Added to database: 2/24/2026, 9:41:33 PM

Last enriched: 2/24/2026, 9:56:09 PM

Last updated: 2/25/2026, 1:26:36 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats