PYSEC-2026-151
Vulnerability from pysec - Published: 2026-04-09 19:16 - Updated: 2026-05-20 09:19
VLAI?
Details
Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls made by the host. Specifically, the following steps must occur to trigger the bug clone a wasmtime::Linker, drop the original linker instance, use the new, cloned linker instance, resulting in a use-after-free. This vulnerability is fixed in 43.0.1.
Severity ?
5.0 (Medium)
Impacted products
| Name | purl | wasmtime | pkg:pypi/wasmtime |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "wasmtime",
"purl": "pkg:pypi/wasmtime"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.0.1",
"0.0.2",
"0.11.0",
"0.12.0",
"0.15.0",
"0.15.1",
"0.16.0",
"0.16.1",
"0.17.0",
"0.18.0",
"0.18.1",
"0.18.2",
"0.19.0",
"0.20.0",
"0.21.0",
"0.22.0",
"0.23.0",
"0.24.0",
"0.25.0",
"0.26.0",
"0.27.0",
"0.28.0",
"0.28.1",
"0.29.0",
"0.30.0",
"0.31.0",
"0.32.0",
"0.33.0",
"0.34.0",
"0.35.0",
"0.36.0",
"0.37.0",
"0.38.0",
"0.39.1",
"0.40.0",
"0.9.0",
"1.0.0",
"1.0.1",
"10.0.0",
"10.0.1",
"11.0.0",
"12.0.0",
"13.0.0",
"13.0.1",
"13.0.2",
"14.0.0",
"15.0.0",
"16.0.0",
"17.0.0",
"17.0.1",
"18.0.0",
"18.0.2",
"19.0.0",
"2.0.0",
"20.0.0",
"21.0.0",
"22.0.0",
"23.0.0",
"24.0.0",
"25.0.0",
"27.0.0",
"27.0.1",
"27.0.2",
"28.0.0",
"29.0.0",
"3.0.0",
"30.0.0",
"31.0.0",
"32.0.0",
"33.0.0",
"34.0.0",
"35.0.0",
"36.0.0",
"37.0.0",
"38.0.0",
"39.0.0",
"4.0.0",
"40.0.0",
"41.0.0",
"42.0.0",
"43.0.0",
"44.0.0",
"5.0.0",
"6.0.0",
"7.0.0",
"8.0.0",
"8.0.1",
"9.0.0"
]
}
],
"aliases": [
"CVE-2026-34983",
"GHSA-hfr4-7c6c-48w2"
],
"details": "Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls made by the host. Specifically, the following steps must occur to trigger the bug clone a wasmtime::Linker, drop the original linker instance, use the new, cloned linker instance, resulting in a use-after-free. This vulnerability is fixed in 43.0.1.",
"id": "PYSEC-2026-151",
"modified": "2026-05-20T09:19:23.560564Z",
"published": "2026-04-09T19:16:24.850Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hfr4-7c6c-48w2"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…