Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4h67-722j-5pmc | Wasmtime vulnerable to segfault when using component resources |
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 29 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bytecodealliance
Bytecodealliance wasmtime |
|
| Vendors & Products |
Bytecodealliance
Bytecodealliance wasmtime |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Oct 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called in a specific way, would crash the host with a segfault or assert failure. Wasmtime 38.0.3 has been released and is patched to fix this issue. There are no workarounds. | |
| Title | Wasmtime vulnerable to segfault when using component resources | |
| Weaknesses | CWE-755 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-27T15:22:22.914Z
Reserved: 2025-10-20T19:41:22.740Z
Link: CVE-2025-62711
Updated: 2025-10-27T15:22:17.745Z
Status : Analyzed
Published: 2025-10-24T22:15:49.850
Modified: 2025-11-03T19:26:50.060
Link: CVE-2025-62711
OpenCVE Enrichment
Updated: 2025-10-27T22:10:28Z
Github GHSA