#VU125763 Out-of-bounds write in Wasmtime - CVE-2026-34987

 

#VU125763 Out-of-bounds write in Wasmtime - CVE-2026-34987

Published: April 10, 2026


Vulnerability identifier: #VU125763
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-34987
CWE-ID: CWE-787
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Wasmtime
Software vendor:
Bytecode Alliance

Description

The vulnerability allows a remote user to access host memory outside the sandbox, disclose sensitive information, cause a denial of service, or potentially execute arbitrary code.

The vulnerability exists due to out-of-bounds write in the Winch compiler backend when compiling and executing properly constructed guest Wasm. A remote user can supply specially crafted guest Wasm to access host memory outside the linear-memory sandbox, disclose sensitive information, cause a denial of service, or potentially execute arbitrary code.

Only deployments using the non-default Winch compiler backend are vulnerable. The aarch64 case has an observed working proof of concept, while the x86-64 case is described as theoretical and may not be reachable in practice.


Remediation

Install security update from vendor's website.

External links