Generated remediation guidance and an executive summary. No account required.
Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings improperly verified the alignment of reallocated strings. This meant that unaligned pointers could be passed to the host for transcoding which would trigger a host panic. This panic is possible to trigger from malicious guests which transfer very specific strings across components with specific addresses. Host panics are considered a DoS vector in Wasmtime as the panic conditions are controlled by the guest in this situation. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1.
Cite this page
CVE-2026-34942. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-34942
Use CWE-129, Bytecodealliance vendor hub and Wasmtime product page to widen CVE-2026-34942 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34987, CVE-2026-34971 and CVE-2026-34941 for nearby disclosures in the same product family.