CVE-2025-54126

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-54126
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54126.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-54126
Aliases
  • GHSA-vh64-mfvw-pxqp
Published
2025-07-29T22:15:25Z
Modified
2025-07-31T20:51:57.332247Z
Summary
[none]
Details

The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.

References

Affected packages

Git / github.com/bytecodealliance/wasm-micro-runtime

Affected ranges

Type
GIT
Repo
https://github.com/bytecodealliance/wasm-micro-runtime
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

Other

01-12-2020
WAMR-01-18-2022
WAMR-01-29-2021
WAMR-02-18-2020
WAMR-02-27-2020
WAMR-03-05-2020
WAMR-03-19-2020
WAMR-03-25-2021
WAMR-03-30-2020
WAMR-04-15-2020
WAMR-04-15-2021
WAMR-05-18-2022
WAMR-06-15-2020
WAMR-07-10-2020
WAMR-08-10-2021
WAMR-09-08-2020
WAMR-09-29-2020
WAMR-12-30-2021
tag-11-28-2019

WAMR-1.*

WAMR-1.0.0
WAMR-1.1.0
WAMR-1.1.1
WAMR-1.1.2
WAMR-1.2.0
WAMR-1.2.1
WAMR-1.2.2
WAMR-1.2.3
WAMR-1.3.0
WAMR-1.3.1
WAMR-1.3.2

WAMR-2.*

WAMR-2.0.0
WAMR-2.1.0
WAMR-2.1.1
WAMR-2.1.2
WAMR-2.2.0
WAMR-2.3.0
WAMR-2.3.1
WAMR-2.4.0