CVE-2026-34941
Received Received - Intake
Bounds Check Bypass in Wasmtime Causes Host Memory Read, DoS

Publication date: 2026-04-09

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of the input string when performing a bounds check. Specifically the number of code units were checked instead of the byte length, which is twice the size of the code units. This vulnerability can cause the host to read beyond the end of a WebAssembly's linear memory in an attempt to transcode nonexistent bytes. In Wasmtime's default configuration this will read unmapped memory on a guard page, terminating the process with a segfault. Wasmtime can be configured, however, without guard pages which would mean that host memory beyond the end of linear memory may be read and interpreted as UTF-16. A host segfault is a denial-of-service vulnerability in Wasmtime, and possibly being able to read beyond the end of linear memory is additionally a vulnerability. Note that reading beyond the end of linear memory requires nonstandard configuration of Wasmtime, specifically with guard pages disabled. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
bytecodealliance wasmtime to 24.0.7 (exc)
bytecodealliance wasmtime From 25.0.0 (inc) to 36.0.7 (exc)
bytecodealliance wasmtime From 37.0.0 (inc) to 42.0.2 (exc)
bytecodealliance wasmtime From 43.0.0 (inc) to 43.0.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34941 is a vulnerability in the Wasmtime runtime for WebAssembly that occurs during the transcoding of UTF-16 strings to the latin1+utf16 component-model encoding.

The issue arises because the code incorrectly validates the input string's length by checking the number of UTF-16 code units instead of the actual byte length, which is twice as large. This improper bounds check can cause the host to read beyond the end of a WebAssembly linear memory buffer.

In Wasmtime's default configuration, this out-of-bounds read triggers a segmentation fault, crashing the host process and causing a denial-of-service. In nonstandard configurations without guard pages, it may allow the host to read and interpret memory beyond the intended boundary, potentially leading to information disclosure.

This vulnerability affects users running untrusted WebAssembly components that perform cross-component string passing involving UTF-16 source strings and latin1+utf16 destination encodings.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial-of-service (DoS) condition caused by the host process crashing due to a segmentation fault triggered by an out-of-bounds read.

If Wasmtime is configured without guard pagesβ€”a nonstandard setupβ€”there is also a risk that the host may read memory beyond the linear memory boundary and interpret it as UTF-16 data, potentially leading to information disclosure.

This means that attackers could cause your application or service using Wasmtime to crash or, in some configurations, potentially leak sensitive information from memory.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability manifests as a host process crash (segmentation fault) when Wasmtime attempts to transcode UTF-16 strings incorrectly, causing an out-of-bounds read. Detection can involve monitoring for unexpected Wasmtime process crashes or segmentation faults (SIGSEGV/SIGBUS) during execution of WebAssembly components that perform UTF-16 to latin1+utf16 transcoding.

Since the vulnerability triggers a denial-of-service via process termination, you can detect it by observing Wasmtime logs or system logs for segfaults related to Wasmtime processes.

There are no specific commands provided in the resources for direct detection or scanning of this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The only effective mitigation is to update Wasmtime to a fixed version. The vulnerability is resolved in Wasmtime versions 24.0.7, 36.0.7, 42.0.2, and 43.0.1.

There are no known workarounds or alternative mitigations; therefore, upgrading to a patched version is critical.

Additionally, avoid running Wasmtime with nonstandard configurations that disable guard pages, as this increases the risk of information disclosure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Wasmtime can cause denial of service through host process crashes and, under nonstandard configurations, potential information disclosure by reading memory beyond intended boundaries.

While the vulnerability may lead to information disclosure in specific configurations, there is no explicit mention in the provided context or resources about direct impacts on compliance with common standards and regulations such as GDPR or HIPAA.

Organizations relying on Wasmtime should consider the risk of potential data exposure or service disruption when evaluating compliance, but no direct compliance implications are detailed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart