CVE-2025-61670
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-10-30
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bytecodealliance | wasmtime | 37.0.0 |
| bytecodealliance | wasmtime | 37.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-772 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Wasmtime runtime's C/C++ API versions 37.0.0 and 37.0.1 when using the `anyref` or `externref` WebAssembly values. It was caused by a regression during a refactoring that changed how memory ownership is handled, specifically moving from a manual unrooting system to an automatic one in Rust. However, the C/C++ APIs were not fully updated to reflect this change, leading to permanent memory leaks when these reference types are used. The Rust API is unaffected, and the issue is fixed in version 37.0.2.
How can this vulnerability impact me? :
This vulnerability can cause memory leaks in applications embedding Wasmtime via the C/C++ API when using `anyref` or `externref` types. Over time, this can lead to increased memory usage and potentially degrade system performance or cause resource exhaustion if the leaks accumulate. If these reference types are not used, or if the Rust API is used instead, the issue does not occur.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update Wasmtime to version 37.0.2 or later, where the memory leak issues in the C/C++ API related to `anyref` and `externref` have been fixed. If updating is not possible, avoid using `anyref` and `externref` types in the C/C++ API to prevent memory leaks.