๐Ÿ” CVE Alert

CVE-2025-14956

MEDIUM 5.3

WebAssembly Binaryen wasm-binary.cpp readExport heap-based overflow

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CWE CWE-122 CWE-119
Vendor webassembly
Product binaryen
Published Dec 19, 2025
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for webassembly binaryen

Be the first to know when new medium vulnerabilities affecting webassembly binaryen are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

WebAssembly / Binaryen
125

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.337592 vuldb.com: https://vuldb.com/?ctiid.337592 vuldb.com: https://vuldb.com/?submit.717315 github.com: https://github.com/WebAssembly/binaryen/issues/8089 github.com: https://github.com/WebAssembly/binaryen/pull/8092 github.com: https://github.com/oneafter/1204/blob/main/hbf github.com: https://github.com/WebAssembly/binaryen/commit/4f52bff8c4075b5630422f902dd92a0af2c9f398 github.com: https://github.com/WebAssembly/binaryen/

Credits

๐Ÿ” Oneafter (VulDB User)