{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15413","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-01T09:23:09.668Z","datePublished":"2026-01-01T21:02:06.923Z","dateUpdated":"2026-02-23T08:03:55.102Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:03:55.102Z"},"title":"wasm3 m3_exec.h op_CallIndirect memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"wasm3","versions":[{"version":"0.1","status":"affected"},{"version":"0.2","status":"affected"},{"version":"0.3","status":"affected"},{"version":"0.4","status":"affected"},{"version":"0.5.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing a manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-13T04:35:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.339334","name":"VDB-339334 | wasm3 m3_exec.h op_CallIndirect memory corruption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.339334","name":"VDB-339334 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.719829","name":"Submit #719829 | wasm3 v0.5.0 and master-branch Memory Corruption","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.719831","name":"Submit #719831 | wasm3 v0.5.0 and master-branch Memory Corruption (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/wasm3/wasm3/issues/543","tags":["issue-tracking"]},{"url":"https://github.com/wasm3/wasm3/issues/547","tags":["exploit","issue-tracking"]},{"url":"https://github.com/wasm3/wasm3/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-05T21:05:31.524705Z","id":"CVE-2025-15413","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-05T21:05:41.110Z"}}]}}