Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. wasmtime
  4. ›
  5. CVE-2025-53901

CVE-2025-53901: Wasmtime CLI is vulnerable to host panic through its fd_renumber function

July 18, 2025 (updated July 21, 2025)

A bug in Wasmtime’s implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder). The specific bug is triggered by calling path_open after calling fd_renumber with either:

  • two equal argument values
  • second argument being equal to a previously-closed file descriptor number value

The corrupt state introduced in fd_renumber will lead to the subsequent opening of a file descriptor to panic. This panic cannot introduce memory unsafety or allow WebAssembly to break outside of its sandbox, however. There is no possible heap corruption or memory unsafety from this panic.

This bug is in the implementation of Wasmtime’s wasmtime-wasi crate which provides an implementation of WASIp1. The bug requires a specially crafted call to fd_renumber in addition to the ability to open a subsequent file descriptor. Opening a second file descriptor is only possible when a preopened directory was provided to the guest, and this is common amongst embeddings. A panic in the host is considered a denial-of-service vector for WebAssembly embedders and is thus a security issue in Wasmtime.

This bug does not affect WASIp2 and embedders using components.

References

  • docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html
  • docs.wasmtime.dev/stability-release.html
  • github.com/WebAssembly/WASI/blob/e1aa1cae4dda4c1f70f23fe11e922aae92f240a8/legacy/preview1/witx/wasi_snapshot_preview1.witx
  • github.com/advisories/GHSA-fm79-3f68-h2fc
  • github.com/bytecodealliance/wasmtime
  • github.com/bytecodealliance/wasmtime/blob/037a6edadbc225decbea00a551aabf04203717d9/crates/wasi/src/preview1.rs
  • github.com/bytecodealliance/wasmtime/pull/11277
  • github.com/bytecodealliance/wasmtime/pull/11278
  • github.com/bytecodealliance/wasmtime/pull/11279
  • github.com/bytecodealliance/wasmtime/pull/11281
  • github.com/bytecodealliance/wasmtime/security/advisories/GHSA-fm79-3f68-h2fc
  • nvd.nist.gov/vuln/detail/CVE-2025-53901
  • rustsec.org/advisories/RUSTSEC-2025-0046.html

Code Behaviors & Features

Detect and mitigate CVE-2025-53901 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.0.0 before 24.0.4, all versions starting from 33.0.0 before 33.0.2, all versions starting from 34.0.0 before 34.0.2

Fixed versions

  • 24.0.4
  • 33.0.2
  • 34.0.2

Solution

Upgrade to versions 24.0.4, 33.0.2, 34.0.2 or above.

Impact 3.5 LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-672: Operation on a Resource after Expiration or Release

Source file

cargo/wasmtime/CVE-2025-53901.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:44 +0000.