CVE-2026-34943: Host-Side Panic and Denial of Service in Wasmtime Dynamic Lifting
Vulnerability ID: CVE-2026-34943
CVSS Score: 5.6
Published: 2026-04-09
Wasmtime is vulnerable to a denial-of-service condition due to a host-side panic triggered when dynamically lifting WebAssembly Component Model flags types. The dynamic lifter fails to ignore undefined bits provided by a guest, leading to an unhandled exception.
TL;DR
A missing bitmasking step in Wasmtime's dynamic lifter allows malicious WebAssembly guests to crash the host runtime by returning extraneous bits in a flags type, causing a Rust panic.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-248 (Uncaught Exception)
- Attack Vector: Network (Requires Module Upload/Execution Privileges)
- CVSS 4.0 Score: 5.6 (Medium)
- Impact: Denial of Service (Host Process Panic)
- Exploit Status: Proof of Concept Available
- KEV Status: Not Listed
Affected Systems
- Wasmtime WebAssembly Runtime Engine (Dynamic Val API deployments)
- Host applications utilizing Wasmtime's wasmtime::component::Val for component model integration
-
Wasmtime: < 24.0.7 (Fixed in:
24.0.7) -
Wasmtime: >= 25.0.0, < 36.0.7 (Fixed in:
36.0.7) -
Wasmtime: >= 37.0.0, < 42.0.2 (Fixed in:
42.0.2) -
Wasmtime: >= 43.0.0, < 44.0.1 (Fixed in:
43.0.1)
Mitigation Strategies
- Upgrade Wasmtime dependencies to one of the patched release versions.
- Migrate host applications to utilize statically generated bindings via the bindgen! macro.
- Restrict WebAssembly component upload and instantiation privileges to highly trusted operators until patches can be deployed.
Remediation Steps:
- Identify all host applications relying on the Wasmtime runtime engine.
- Review the project source code to determine if the wasmtime::component::Val API is used for dynamic guest interactions.
- Update the Cargo.toml file to reference the corresponding patched Wasmtime version (e.g., 43.0.1).
- Recompile the host application and execute regression testing.
- Deploy the updated host binaries to production environments.
References
- GHSA-m758-wjhj-p3jq: Wasmtime Security Advisory
- Bytecode Alliance Security Update
- CVE Record: CVE-2026-34943
- Red Hat Security Portal: CVE-2026-34943
Read the full report for CVE-2026-34943 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)