CVE-2025-53901
BaseFortify
Publication date: 2025-07-18
Last updated on: 2025-09-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bytecodealliance | wasmtime | to 24.0.4 (exc) |
| bytecodealliance | wasmtime | From 33.0.0 (inc) to 33.0.2 (exc) |
| bytecodealliance | wasmtime | From 34.0.0 (inc) to 34.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-672 | The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-53901 is a vulnerability in Wasmtime's WASIp1 implementation where a WebAssembly guest can cause the host (embedder) to panic by making a specially crafted call to the `fd_renumber` function with either two identical arguments or a second argument equal to a previously closed file descriptor. This corrupts internal state and causes a subsequent call to `path_open` to panic the host. Although this panic causes a denial-of-service by crashing the host, it does not lead to memory unsafety, heap corruption, or allow the guest to escape its sandbox. The vulnerability requires the guest to have access to open a second file descriptor, which is common when a preopened directory is provided. It affects versions prior to 24.0.4, 33.0.2, and 34.0.2, and does not affect WASIp2 or embedders using components. [1]
How can this vulnerability impact me? :
This vulnerability can cause a denial-of-service (DoS) condition by crashing the host running Wasmtime when exploited. This means that an attacker controlling a WebAssembly guest could cause the host application embedding Wasmtime to panic and stop functioning properly. However, it does not compromise memory safety, data confidentiality, or integrity, nor does it allow the guest to escape the sandbox. The impact is limited to availability disruption. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade Wasmtime to one of the patched versions: 24.0.4, 33.0.2, or 34.0.2. There is no effective workaround other than updating. Embedders who do not provide guest access to create additional file descriptors or who use components are not affected. Otherwise, updating to a patched version is the recommended mitigation. [1]