CVE-2026-27572
February 24, 2026
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the "wasi:http/types.fields" resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the "wasmtime-wasi-http" crate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking. There are no known workarounds at this time. Embedders are encouraged to update to a patched version of Wasmtime.
Affected Packages
https://github.com/bytecodealliance/wasmtime.git (GITHUB):
Affected version(s) >=v41.0.0 <v41.0.4Fix Suggestion:
Update to version v41.0.4https://github.com/bytecodealliance/wasmtime.git (GITHUB):
Affected version(s) >=v0.2.0 <v24.0.6Fix Suggestion:
Update to version v24.0.6https://github.com/bytecodealliance/wasmtime.git (GITHUB):
Affected version(s) >=v25.0.0 <v36.0.6Fix Suggestion:
Update to version v36.0.6wasmtime (RUST):
Affected version(s) >=37.0.0 <40.0.4Fix Suggestion:
Update to version 40.0.4wasmtime (RUST):
Affected version(s) >=0.0.0 <24.0.6Fix Suggestion:
Update to version 24.0.6wasmtime (RUST):
Affected version(s) >=25.0.0 <36.0.6Fix Suggestion:
Update to version 36.0.6Related ResourcesĀ (11)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
HIGH
CVSS v3
Base Score:
6.8
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
EPSS
Base Score:
0.07