Vulnerability DatabaseGHSA-w65j-g6c7-g3m4

GHSA-w65j-g6c7-g3m4
Rust vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-w65j-g6c7-g3m4) affects the actix-web Rust package, discovered on June 8, 2018, and involves multiple memory safety issues in versions prior to 0.7.15. The issues were officially published to the GitHub Advisory Database on August 25, 2021, and last updated on January 11, 2023. This security flaw was categorized as having moderate severity and primarily affected the memory handling mechanisms in the web server implementation (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability encompasses multiple memory safety issues in the codebase, specifically: 1) Unsound coercion of immutable references to mutable references, 2) Improper lifetime extension of strings, and 3) Incorrect implementation of the Send marker trait for objects that cannot be safely transmitted between threads. The issue was particularly concerning as the codebase contained over 100 uses of unsafe code, primarily implemented for performance optimization (GitHub Issue, GitHub Advisory).

Impact

The vulnerability could result in various memory corruption scenarios, with use-after-free being the most likely outcome. This was particularly critical for organizations using the software in large-scale production environments, as web servers often face the public Internet where security is paramount. The issues could potentially lead to segmentation faults in production and compromise the memory safety guarantees that Rust typically provides (GitHub Advisory, GitHub Issue).

Mitigation and workarounds

The issues were resolved through a significant refactoring effort, and users are advised to upgrade to version 0.7.15 or later of actix-web. The fix involved a comprehensive review and modification of unsafe code usage throughout the codebase (GitHub Advisory, RustSec Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66627HIGH8.4
  • RustRust
  • wasmi
NoYesDec 09, 2025
GHSA-xrv8-2pf5-f3q7MEDIUM6
  • RustRust
  • nitro-tpm-pcr-compute
NoYesDec 05, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management