CVE-2025-2368
Publication date 17 March 2025
Last updated 3 July 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| wabt | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity impact | Low |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-2368
- https://github.com/WebAssembly/wabt/issues/2556
- https://github.com/WebAssembly/wabt/issues/2537
- https://github.com/WebAssembly/wabt/issues/2556#issue-2899598349
- https://github.com/WebAssembly/wabt/pull/2541
- https://vuldb.com/?ctiid.299867
- https://vuldb.com/?id.299867
- https://vuldb.com/?submit.515327