RustSec logo

HistoryEditJSON (OSV)

RUSTSEC-2026-0095

Wasmtime with Winch compiler backend may allow a sandbox-escaping memory access

Reported
Issued
Package
wasmtime (crates.io)
Type
Vulnerability
Aliases
References
CVSS Score
9 CRITICAL
CVSS Details
Attack Complexity
Low
Attack Requirements
Present
Attack Vector
Network
Privileges Required
Low
Availability Impact to the Subsequent System
High
Confidentiality Impact to the Subsequent System
High
Integrity Impact to the Subsequent System
High
User Interaction
None
Availability Impact to the Vulnerable System
High
Confidentiality Impact to the Vulnerable System
High
Integrity Impact to the Vulnerable System
High
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Patched
  • >=36.0.7, <37.0.0
  • >=42.0.2, <43.0.0
  • >=43.0.1

Description

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xx5w-cvp6-jv83 For more information see the GitHub-hosted security advisory.

Advisory available under CC0-1.0 license.