CVE-2023-27477
Rust vulnerability analysis and mitigation

Overview

Wasmtime's code generation backend, Cranelift, contains a bug on x86_64 platforms affecting the WebAssembly i8x16.select instruction. The vulnerability (CVE-2023-27477) was discovered and disclosed on March 8, 2023. The issue affects Wasmtime versions 6.0.0 and earlier, down to version 1.0.0. The bug produces incorrect results when the same operand is provided to the instruction and some of the selected indices are greater than 16 (GitHub Advisory).

Technical details

The vulnerability stems from an off-by-one error in the calculation of the mask to the pshufb instruction, which causes incorrect results to be returned if lanes are selected from the second vector. The bug specifically affects the x86_64 platform implementation of the WebAssembly SIMD (Single Instruction, Multiple Data) feature. The issue has been assigned a CVSS v3.1 base score of 3.1 (Low) with a vector of CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N (GitHub Advisory).

Impact

The miscompilation can cause WebAssembly instructions to produce incorrect results for the i8x16.select instruction. While this does not represent a sandbox escape or affect embedders directly, guest programs may behave unexpectedly due to the incorrect instruction results. In extreme cases, if a guest program handles untrusted input, it may deviate from intended execution, potentially calling imported host functions with different arguments than intended (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in Wasmtime versions 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these patched versions. For those unable to upgrade immediately, two workarounds are available: disable the Wasm SIMD proposal using config.wasm_simd(false), or use platforms other than x86_64 (such as AArch64 and s390x) which are not affected by this bug (GitHub Advisory, Security Announcement).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management