{"api_version":"1","generated_at":"2026-05-11T13:04:02+00:00","cve":"CVE-2025-6273","urls":{"html":"https://cve.report/CVE-2025-6273","api":"https://cve.report/api/cve/CVE-2025-6273.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-6273","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-6273"},"summary":{"title":"WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion","description":"A vulnerability was found in WebAssembly wabt up to 1.0.37 and classified as problematic. This issue affects the function LogOpcode of the file src/binary-reader-objdump.cc. The manipulation leads to reachable assertion. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains that this issue might not affect \"real world wasm programs\".","state":"PUBLISHED","assigner":"VulDB","published_at":"2025-06-19 19:15:21","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-617","CWE-617 Reachable Assertion"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.9","severity":"LOW","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"4.8","severity":"MEDIUM","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"3.3","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"3.3","severity":"LOW","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","data":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"3.3","severity":"LOW","vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","data":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"1.7","severity":"","vector":"AV:L/AC:L/Au:S/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P","baseScore":1.7,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"1.7","severity":"","vector":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/?id.313277","name":"https://vuldb.com/?id.313277","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/user-attachments/files/19529411/wabt_crash.txt","name":"https://github.com/user-attachments/files/19529411/wabt_crash.txt","refsource":"cna@vuldb.com","tags":["Exploit"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.313277","name":"https://vuldb.com/?ctiid.313277","refsource":"cna@vuldb.com","tags":["Permissions Required","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/WebAssembly/wabt/issues/2574","name":"https://github.com/WebAssembly/wabt/issues/2574","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Issue Tracking","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.593010","name":"https://vuldb.com/?submit.593010","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-6273","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6273","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.0","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.1","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.2","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.3","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.4","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.5","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.6","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.7","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.8","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.9","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.10","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.11","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.12","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.13","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.14","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.15","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.16","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.17","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.18","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.19","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.20","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.21","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.22","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.23","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.24","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.25","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.26","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.27","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.28","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.29","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.30","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.31","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.32","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.33","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.34","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.35","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.36","platforms":[]},{"source":"CNA","vendor":"WebAssembly","product":"wabt","version":"affected 1.0.37","platforms":[]}],"timeline":[{"source":"CNA","time":"2025-06-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2025-06-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2025-06-19T08:44:00.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"JJLeo (VulDB User)","lang":"en"}],"nvd_cpes":[{"cve_year":"2025","cve_id":"6273","vulnerable":"1","versionEndIncluding":"1.0.37","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webassembly","cpe5":"wabt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-6273","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-06-23T16:16:54.491286Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-06-23T19:30:37.748Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/WebAssembly/wabt/issues/2574"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"wabt","vendor":"WebAssembly","versions":[{"status":"affected","version":"1.0.0"},{"status":"affected","version":"1.0.1"},{"status":"affected","version":"1.0.2"},{"status":"affected","version":"1.0.3"},{"status":"affected","version":"1.0.4"},{"status":"affected","version":"1.0.5"},{"status":"affected","version":"1.0.6"},{"status":"affected","version":"1.0.7"},{"status":"affected","version":"1.0.8"},{"status":"affected","version":"1.0.9"},{"status":"affected","version":"1.0.10"},{"status":"affected","version":"1.0.11"},{"status":"affected","version":"1.0.12"},{"status":"affected","version":"1.0.13"},{"status":"affected","version":"1.0.14"},{"status":"affected","version":"1.0.15"},{"status":"affected","version":"1.0.16"},{"status":"affected","version":"1.0.17"},{"status":"affected","version":"1.0.18"},{"status":"affected","version":"1.0.19"},{"status":"affected","version":"1.0.20"},{"status":"affected","version":"1.0.21"},{"status":"affected","version":"1.0.22"},{"status":"affected","version":"1.0.23"},{"status":"affected","version":"1.0.24"},{"status":"affected","version":"1.0.25"},{"status":"affected","version":"1.0.26"},{"status":"affected","version":"1.0.27"},{"status":"affected","version":"1.0.28"},{"status":"affected","version":"1.0.29"},{"status":"affected","version":"1.0.30"},{"status":"affected","version":"1.0.31"},{"status":"affected","version":"1.0.32"},{"status":"affected","version":"1.0.33"},{"status":"affected","version":"1.0.34"},{"status":"affected","version":"1.0.35"},{"status":"affected","version":"1.0.36"},{"status":"affected","version":"1.0.37"}]}],"credits":[{"lang":"en","type":"reporter","value":"JJLeo (VulDB User)"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in WebAssembly wabt up to 1.0.37 and classified as problematic. This issue affects the function LogOpcode of the file src/binary-reader-objdump.cc. The manipulation leads to reachable assertion. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains that this issue might not affect \"real world wasm programs\"."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in WebAssembly wabt bis 1.0.37 gefunden. Dies betrifft die Funktion LogOpcode der Datei src/binary-reader-objdump.cc. Durch Manipulieren mit unbekannten Daten kann eine reachable assertion-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung. Bisher konnte die Existenz der vermeintlichen Schwachstelle noch nicht eindeutig nachgewiesen werden."}],"metrics":[{"cvssV4_0":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-617","description":"Reachable Assertion","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-06-19T18:31:06.692Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-313277 | WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.313277"},{"name":"VDB-313277 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.313277"},{"name":"Submit #593010 | WebAssembly wabt wabt 1.0.37 (commit a60eb26) Reachable Assertion","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.593010"},{"tags":["issue-tracking"],"url":"https://github.com/WebAssembly/wabt/issues/2574"},{"tags":["exploit"],"url":"https://github.com/user-attachments/files/19529411/wabt_crash.txt"}],"tags":["disputed"],"timeline":[{"lang":"en","time":"2025-06-19T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2025-06-19T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2025-06-19T08:44:00.000Z","value":"VulDB entry last update"}],"title":"WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2025-6273","datePublished":"2025-06-19T18:31:06.692Z","dateReserved":"2025-06-19T06:38:03.623Z","dateUpdated":"2025-06-23T19:30:37.748Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2025-06-19 19:15:21","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-617","CWE-617 Reachable Assertion"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P","baseScore":1.7,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.1,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webassembly:wabt:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.37","matchCriteriaId":"A9972FF3-2D0A-438D-94A7-B7E4F9AEB32E"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"6273","Ordinal":"1","Title":"WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion","CVE":"CVE-2025-6273","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"6273","Ordinal":"1","NoteData":"A vulnerability was found in WebAssembly wabt up to 1.0.37 and classified as problematic. This issue affects the function LogOpcode of the file src/binary-reader-objdump.cc. The manipulation leads to reachable assertion. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains that this issue might not affect \"real world wasm programs\".","Type":"Description","Title":"WebAssembly wabt binary-reader-objdump.cc LogOpcode assertion"}]}}}