CVE-2025-53901: Wasmtime CLI is vulnerable to host panic through its fd_renumber function
(updated )
A bug in Wasmtime’s implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder).
The specific bug is triggered by calling path_open
after calling fd_renumber
with either:
- two equal argument values
- second argument being equal to a previously-closed file descriptor number value
The corrupt state introduced in fd_renumber
will lead to the subsequent opening of a file descriptor to panic. This panic cannot introduce memory unsafety or allow WebAssembly to break outside of its sandbox, however. There is no possible heap corruption or memory unsafety from this panic.
This bug is in the implementation of Wasmtime’s wasmtime-wasi
crate which provides an implementation of WASIp1. The bug requires a specially crafted call to fd_renumber
in addition to the ability to open a subsequent file descriptor. Opening a second file descriptor is only possible when a preopened directory was provided to the guest, and this is common amongst embeddings. A panic in the host is considered a denial-of-service vector for WebAssembly embedders and is thus a security issue in Wasmtime.
This bug does not affect WASIp2 and embedders using components.
References
- docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html
- docs.wasmtime.dev/stability-release.html
- github.com/WebAssembly/WASI/blob/e1aa1cae4dda4c1f70f23fe11e922aae92f240a8/legacy/preview1/witx/wasi_snapshot_preview1.witx
- github.com/advisories/GHSA-fm79-3f68-h2fc
- github.com/bytecodealliance/wasmtime
- github.com/bytecodealliance/wasmtime/blob/037a6edadbc225decbea00a551aabf04203717d9/crates/wasi/src/preview1.rs
- github.com/bytecodealliance/wasmtime/pull/11277
- github.com/bytecodealliance/wasmtime/pull/11278
- github.com/bytecodealliance/wasmtime/pull/11279
- github.com/bytecodealliance/wasmtime/pull/11281
- github.com/bytecodealliance/wasmtime/security/advisories/GHSA-fm79-3f68-h2fc
- nvd.nist.gov/vuln/detail/CVE-2025-53901
- rustsec.org/advisories/RUSTSEC-2025-0046.html
Code Behaviors & Features
Detect and mitigate CVE-2025-53901 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →