CVE-2025-64345
Rust vulnerability analysis and mitigation

Overview

CVE-2025-64345 affects Wasmtime, a runtime for WebAssembly, prior to versions 38.0.4, 37.0.3, 36.0.3, and 24.0.5. The vulnerability exists in Wasmtime's Rust embedder API where a WebAssembly shared linear memory could be viewed as a type which provides safe access to the host (Rust) to the contents of the linear memory, leading to potential data races (GitHub Advisory). The vulnerability was disclosed and patched on November 11, 2025.

Technical details

The vulnerability stems from an unsound interaction in the API where shared linear memories could be incorrectly accessed through the wasmtime::Memory type instead of the required wasmtime::SharedMemory type. Two specific vectors were identified: the Memory::new constructor did not properly reject shared memory types, and core dumps would expose all linear memories as wasmtime::Memory, potentially causing unsynchronized reads of shared linear memory (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 1.8 (Low) with vector CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N (GitHub Advisory).

Impact

The vulnerability could lead to data races in the host when shared memories are created across threads. However, embeddings that do not use the WebAssembly threads proposal, do not create shared memories, or do not actually share shared memories across threads are unaffected (GitHub Advisory).

Mitigation and workarounds

Patch releases have been issued for all supported versions of Wasmtime: 24.0.5, 36.0.3, 37.0.3, and 38.0.4. These releases reject creation of shared memories via Memory::new and exclude shared memories from core dumps. As a workaround, affected embeddings should use SharedMemory::new instead of Memory::new to create shared memories and disable core dumps if unable to upgrade. Note that core dumps are disabled by default, but the WebAssembly threads proposal and shared memory are enabled by default (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64170LOW3.8
  • RustRust
  • rust-sudo-rs
NoYesNov 12, 2025
CVE-2025-64345LOW1.8
  • RustRust
  • wasmtime
NoYesNov 12, 2025
RUSTSEC-2025-0117N/AN/A
  • RustRust
  • tandem
NoNoNov 10, 2025
RUSTSEC-2025-0116N/AN/A
  • RustRust
  • tandem_garble_interop
NoNoNov 10, 2025
RUSTSEC-2025-0115N/AN/A
  • RustRust
  • tandem_http_server
NoNoNov 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management