CVE-2025-15413
A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function opSetSloti32/opCallIndirect of the file m3exec.h. Performing a manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/wasm3/wasm3/, https://vuldb.com/?ctiid.339334, https://vuldb.com/?id.339334, https://vuldb.com/?submit.719829, https://vuldb.com/?submit.719831, https://github.com/wasm3/wasm3/issues/543, https://github.com/wasm3/wasm3/issues/547, https://vuldb.com/?ctiid.339334, https://github.com/wasm3/wasm3/issues/543, https://github.com/wasm3/wasm3/issues/547
