Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jxhv-7h78-9775 | Wasmtime: Panic when transcoding misaligned utf-16 strings |
Mon, 20 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bytecodealliance
Bytecodealliance wasmtime |
|
| Vendors & Products |
Bytecodealliance
Bytecodealliance wasmtime |
Fri, 10 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-823 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 09 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings improperly verified the alignment of reallocated strings. This meant that unaligned pointers could be passed to the host for transcoding which would trigger a host panic. This panic is possible to trigger from malicious guests which transfer very specific strings across components with specific addresses. Host panics are considered a DoS vector in Wasmtime as the panic conditions are controlled by the guest in this situation. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. | |
| Title | Wasmtime panics when transcoding misaligned utf-16 strings | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T19:36:13.614Z
Reserved: 2026-03-31T17:27:08.660Z
Link: CVE-2026-34942
Updated: 2026-04-09T19:35:15.816Z
Status : Analyzed
Published: 2026-04-09T19:16:23.857
Modified: 2026-04-20T18:28:12.557
Link: CVE-2026-34942
OpenCVE Enrichment
Updated: 2026-04-10T09:31:44Z
Github GHSA