CVE-2025-15411
PUBLISHED 1/1/2026 1af790b2-7ee1-4545-860a-a788eba489b5
Technical Description
A weakness has been identified in WebAssembly wabt up to 1.0.39. This vulnerability affects the function wabt::AST::InsertNode of the file /src/repro/wabt/bin/wasm-decompile of the component wasm-decompile. This manipulation causes memory corruption. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. Unfortunately, the project has no active maintainer at the moment. In a reply to the issue report somebody recommended to the researcher to provide a PR himself.
Affected Products
WebAssembly
wabt
1.0.01.0.11.0.2
References
https://vuldb.com/?id.339332
VDB-339332 | WebAssembly wabt wasm-decompile InsertNode memory corruption
https://vuldb.com/?ctiid.339332
VDB-339332 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?submit.719825
Submit #719825 | WebAssembly wabt 1.0.39 and master-branch Heap-based Buffer Overflow
https://github.com/WebAssembly/wabt/issues/2679
External Link
https://github.com/oneafter/1208/blob/main/af1
External Link
Impact Analysis
Attack Vector Network
Attack Complexity Low
Privileges Required None