CVE-2025-15413
PUBLISHED 1/1/2026 1af790b2-7ee1-4545-860a-a788eba489b5
Technical Description
A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment.
Affected Products
n/a
wasm3
0.10.20.3
References
https://vuldb.com/?id.339334
VDB-339334 | wasm3 m3_exec.h op_CallIndirect memory corruption
https://vuldb.com/?ctiid.339334
VDB-339334 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?submit.719829
Submit #719829 | wasm3 v0.5.0 and master-branch Memory Corruption
https://vuldb.com/?submit.719831
Submit #719831 | wasm3 v0.5.0 and master-branch Memory Corruption (Duplicate)
https://github.com/wasm3/wasm3/issues/543
External Link
https://github.com/wasm3/wasm3/issues/547
External Link
Impact Analysis
Attack Vector Network
Attack Complexity Low
Privileges Required None