Cyber Posture

CVE-2025-2368

MediumPublic PoC

Published: 17 March 2025

Published
17 March 2025
Modified
06 January 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0036 58.0th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2368 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Webassembly Wabt. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 42.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the heap-based buffer overflow by requiring timely remediation through application of the available patch for wabt 1.0.36.

prevent

Provides memory protections such as ASLR and heap hardening to prevent successful exploitation of the buffer overflow in the BinaryReaderInterp::OnExport function.

prevent

Validates malformed WebAssembly file inputs before processing by the vulnerable Malformed File Handler component to block overflow triggers.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The CVE describes exploitation of a heap buffer overflow in a malformed file handler via a crafted file requiring user interaction to open/process in an affected application, directly mapping to client-side exploitation and malicious file delivery.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be…

more

initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

Deeper analysisAI

CVE-2025-2368 is a critical heap-based buffer overflow vulnerability in WebAssembly wabt version 1.0.36. It affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport in the file wabt/src/interp/binary-reader-interp.cc within the Malformed File Handler component.

The vulnerability can be exploited remotely by an unauthenticated attacker who manipulates a malformed file. Exploitation requires user interaction, such as opening or processing the file in an affected application. Successful attacks result in low-impact confidentiality, integrity, and availability violations, with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Associated weakness identifiers include CWE-119, CWE-122, and CWE-787.

Advisories in GitHub issues #2537 and #2556, along with pull request #2541 in the WebAssembly/wabt repository, detail the issue and provide a patch. The VulDB entry (ctiid.299867) recommends applying the patch to mitigate the vulnerability, noting that the exploit has been publicly disclosed and may be used.

Details

CWE(s)

Affected Products

webassembly
wabt
1.0.36

CVEs Like This One

CVE-2025-15411Same product: Webassembly Wabt
CVE-2025-15412Same product: Webassembly Wabt
CVE-2026-25582Shared CWE-119, CWE-122
CVE-2025-24439Shared CWE-122, CWE-787
CVE-2025-21139Shared CWE-122, CWE-787
CVE-2026-31796Shared CWE-122, CWE-787
CVE-2026-21277Shared CWE-122, CWE-787
CVE-2025-2338Shared CWE-119, CWE-122
CVE-2025-24443Shared CWE-122, CWE-787
CVE-2025-2750Shared CWE-119, CWE-787

References