WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 04 Dec 2025 04:00:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*

Thu, 27 Nov 2025 19:00:00 +0900

Type Values Removed Values Added
First Time appeared Bytecodealliance
Bytecodealliance webassembly Micro Runtime
Vendors & Products Bytecodealliance
Bytecodealliance webassembly Micro Runtime

Thu, 27 Nov 2025 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 07:30:00 +0900

Type Values Removed Values Added
Description WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
Title WebAssembly Micro Runtime vulnerable to a segmentation fault in v128.store instruction
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-26T16:03:41.819Z

Reserved: 2025-11-10T14:07:42.920Z

Link: CVE-2025-64704

cve-icon Vulnrichment

Updated: 2025-11-26T16:03:34.735Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-25T23:15:47.583

Modified: 2025-12-03T18:50:20.670

Link: CVE-2025-64704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-27T18:45:53Z

Weaknesses