Generated remediation guidance and an executive summary. No account required.
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, an out-of-bounds array access issue exists in WAMR's fast interpreter mode during WASM bytecode loading. When frame_ref_bottom and frame_offset_bottom arrays are at capacity and a GET_GLOBAL(I32) opcode is encountered, frame_ref_bottom is expanded but frame_offset_bottom may not be. If this is immediately followed by an if opcode that triggers preserve_local_for_block, the function traverses arrays using stack_cell_num as the upper bound, causing out-of-bounds access to frame_offset_bottom since it wasn't expanded to match the increased stack_cell_num. This issue has been patched in version 2.4.4.
Cite this page
CVE-2025-64713. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-64713
Use CWE-119, Bytecodealliance vendor hub and Webassembly Micro Runtime product page to widen CVE-2025-64713 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-25431, CVE-2024-27532 and CVE-2024-34251 for nearby disclosures in the same product family.