A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14956.json"
[
{
"signature_type": "Function",
"id": "CVE-2025-14956-31b4e4e1",
"source": "https://github.com/webassembly/binaryen/commit/4f52bff8c4075b5630422f902dd92a0af2c9f398",
"signature_version": "v1",
"target": {
"function": "WasmBinaryReader::readExpression",
"file": "src/wasm/wasm-binary.cpp"
},
"deprecated": false,
"digest": {
"function_hash": "297504919989245700610474729391651764270",
"length": 357.0
}
},
{
"signature_type": "Line",
"id": "CVE-2025-14956-646ed37d",
"source": "https://github.com/webassembly/binaryen/commit/4f52bff8c4075b5630422f902dd92a0af2c9f398",
"signature_version": "v1",
"target": {
"file": "src/wasm/wasm-binary.cpp"
},
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"201480928520681906379950524024727729655",
"334726967807214632206129284775153697474",
"304652278790085127732226364469106342570",
"38127243108464750520046628332426506894",
"71237723187431418267481440117115206607",
"252088095133434476482696689927987076667",
"249611125164174963394737326246462431268",
"1411843634869612402975512596183721162",
"242793103065672669814075219089174268581"
]
}
}
]