Generated remediation guidance and an executive summary. No account required.
The WebAssembly Micro Runtime's (WAMR) iwasm package is the executable binary built with WAMR VMcore which supports WebAssembly System Interface (WASI) and command line interface. In versions 2.4.0 and below, iwasm uses --addr-pool with an IPv4 address that lacks a subnet mask, allowing the system to accept all IP addresses. This can unintentionally expose the service to all incoming connections and bypass intended access restrictions. Services relying on --addr-pool for restricting access by IP may unintentionally become open to all external connections. This may lead to unauthorized access in production deployments, especially when users assume that specifying an IP without a subnet mask implies a default secure configuration. This is fixed in version 2.4.1.
Cite this page
CVE-2025-54126. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-54126
Use CWE-668, Bytecodealliance vendor hub and Webassembly Micro Runtime product page to widen CVE-2025-54126 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-25431, CVE-2024-27532 and CVE-2024-34251 for nearby disclosures in the same product family.