Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-27204
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-24 Feb, 2026 | 21:23
Updated At-27 Feb, 2026 | 20:54
Rejected At-
▼CVE Numbering Authority (CNA)
Wasmtime WASI implementations are vulnerable to guest-controlled resource exhaustion

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of WASI host interfaces are susceptible to guest-controlled resource exhaustion on the host. Wasmtime did not appropriately place limits on resource allocations requested by the guests. This serves as a Denial of Service vector. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 have all been released with the fix for this issue. These versions do not prevent this issue in their default configuration to avoid breaking preexisting behaviors. All versions of Wasmtime have appropriate knobs to prevent this behavior, and Wasmtime 42.0.0-and-later will have these knobs tuned by default to prevent this issue from happening. There are no known workarounds for this issue without upgrading. Embedders are recommended to upgrade and configure their embeddings as necessary to prevent possibly-malicious guests from triggering this issue.

Affected Products
Vendor
bytecodealliance
Product
wasmtime
Versions
Affected
  • < 24.0.6
  • >= 25.0.0, < 36.0.6
  • >= 37.0.0, < 40.0.4
  • >= 41.0.0, < 41.0.4
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400: Uncontrolled Resource Consumption
CWECWE-770CWE-770: Allocation of Resources Without Limits or Throttling
CWECWE-774CWE-774: Allocation of File Descriptors or Handles Without Limits or Throttling
CWECWE-789CWE-789: Memory Allocation with Excessive Size Value
Type: CWE
CWE ID: CWE-400
Description: CWE-400: Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-770
Description: CWE-770: Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-774
Description: CWE-774: Allocation of File Descriptors or Handles Without Limits or Throttling
Type: CWE
CWE ID: CWE-789
Description: CWE-789: Memory Allocation with Excessive Size Value
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-852m-cvvp-9p4w
x_refsource_CONFIRM
https://github.com/bytecodealliance/wasmtime/issues/11552
x_refsource_MISC
https://github.com/bytecodealliance/wasmtime/pull/12599
x_refsource_MISC
https://docs.rs/wasmtime-wasi/latest/wasmtime_wasi/struct.WasiCtxBuilder.html#method.max_random_size
x_refsource_MISC
https://docs.rs/wasmtime/latest/wasmtime/component/struct.ResourceTable.html#method.set_max_capacity
x_refsource_MISC
https://docs.rs/wasmtime/latest/wasmtime/struct.Store.html#method.set_hostcall_fuel
x_refsource_MISC
https://docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html
x_refsource_MISC
Hyperlink: https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-852m-cvvp-9p4w
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/bytecodealliance/wasmtime/issues/11552
Resource:
x_refsource_MISC
Hyperlink: https://github.com/bytecodealliance/wasmtime/pull/12599
Resource:
x_refsource_MISC
Hyperlink: https://docs.rs/wasmtime-wasi/latest/wasmtime_wasi/struct.WasiCtxBuilder.html#method.max_random_size
Resource:
x_refsource_MISC
Hyperlink: https://docs.rs/wasmtime/latest/wasmtime/component/struct.ResourceTable.html#method.set_max_capacity
Resource:
x_refsource_MISC
Hyperlink: https://docs.rs/wasmtime/latest/wasmtime/struct.Store.html#method.set_hostcall_fuel
Resource:
x_refsource_MISC
Hyperlink: https://docs.wasmtime.dev/security-what-is-considered-a-security-vulnerability.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found