{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15411","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-01T09:18:56.704Z","datePublished":"2026-01-01T19:32:07.421Z","dateUpdated":"2026-02-23T08:03:27.517Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:03:27.517Z"},"title":"WebAssembly wabt wasm-decompile InsertNode memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"WebAssembly","product":"wabt","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"},{"version":"1.0.2","status":"affected"},{"version":"1.0.3","status":"affected"},{"version":"1.0.4","status":"affected"},{"version":"1.0.5","status":"affected"},{"version":"1.0.6","status":"affected"},{"version":"1.0.7","status":"affected"},{"version":"1.0.8","status":"affected"},{"version":"1.0.9","status":"affected"},{"version":"1.0.10","status":"affected"},{"version":"1.0.11","status":"affected"},{"version":"1.0.12","status":"affected"},{"version":"1.0.13","status":"affected"},{"version":"1.0.14","status":"affected"},{"version":"1.0.15","status":"affected"},{"version":"1.0.16","status":"affected"},{"version":"1.0.17","status":"affected"},{"version":"1.0.18","status":"affected"},{"version":"1.0.19","status":"affected"},{"version":"1.0.20","status":"affected"},{"version":"1.0.21","status":"affected"},{"version":"1.0.22","status":"affected"},{"version":"1.0.23","status":"affected"},{"version":"1.0.24","status":"affected"},{"version":"1.0.25","status":"affected"},{"version":"1.0.26","status":"affected"},{"version":"1.0.27","status":"affected"},{"version":"1.0.28","status":"affected"},{"version":"1.0.29","status":"affected"},{"version":"1.0.30","status":"affected"},{"version":"1.0.31","status":"affected"},{"version":"1.0.32","status":"affected"},{"version":"1.0.33","status":"affected"},{"version":"1.0.34","status":"affected"},{"version":"1.0.35","status":"affected"},{"version":"1.0.36","status":"affected"},{"version":"1.0.37","status":"affected"},{"version":"1.0.38","status":"affected"},{"version":"1.0.39","status":"affected"}],"cpes":["cpe:2.3:a:webassembly:wabt:*:*:*:*:*:*:*:*"],"modules":["wasm-decompile"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in WebAssembly wabt up to 1.0.39. This vulnerability affects the function wabt::AST::InsertNode of the file /src/repro/wabt/bin/wasm-decompile of the component wasm-decompile. This manipulation causes memory corruption. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. Unfortunately, the project has no active maintainer at the moment. In a reply to the issue report somebody recommended to the researcher to provide a PR himself."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-06T17:41:47.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.339332","name":"VDB-339332 | WebAssembly wabt wasm-decompile InsertNode memory corruption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.339332","name":"VDB-339332 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.719825","name":"Submit #719825 | WebAssembly wabt 1.0.39 and master-branch Heap-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.736404","name":"Submit #736404 | WebAssembly wabt 1.0.39 and master-branch Use After Free (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/WebAssembly/wabt/issues/2679","tags":["issue-tracking"]},{"url":"https://github.com/oneafter/1208/blob/main/af1","tags":["exploit"]},{"url":"https://github.com/WebAssembly/wabt/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-05T21:03:24.165884Z","id":"CVE-2025-15411","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-05T21:04:04.609Z"}}]}}