HistoryEditJSON (OSV)

RUSTSEC-2026-0020

Guest-controlled resource exhaustion in WASI implementations

Reported
Issued
Package
wasmtime (crates.io)
Type
Vulnerability
Aliases
References
CVSS Score
6.9 MEDIUM
CVSS Details
Attack Complexity
Low
Attack Requirements
Present
Attack Vector
Network
Privileges Required
Low
Availability Impact to the Subsequent System
High
Confidentiality Impact to the Subsequent System
None
Integrity Impact to the Subsequent System
None
User Interaction
Passive
Availability Impact to the Vulnerable System
High
Confidentiality Impact to the Vulnerable System
None
Integrity Impact to the Vulnerable System
None
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
Patched
  • >=24.0.6, <25.0.0
  • >=36.0.6, <37.0.0
  • >=40.0.4, <41.0.0
  • >=41.0.4

Description

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-852m-cvvp-9p4w For more information see the GitHub-hosted security advisory.

Advisory available under CC0-1.0 license.