VYPR
High severityNVD Advisory· Published Sep 20, 2022· Updated May 28, 2025

CVE-2022-39974

CVE-2022-39974

Description

WASM3 v0.5.0 was discovered to contain a segmentation fault via the component op_Select_i32_srs in wasm3/source/m3_exec.h.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WASM3 v0.5.0 suffers a segmentation fault in the op_Select_i32_srs function, leading to denial of service via crafted WebAssembly bytecode.

Root

Cause

The vulnerability resides in the op_Select_i32_srs function within wasm3/source/m3_exec.h at line 1078. During execution, the code attempts to dereference a pointer stored in the RCX register, which is observed to be 0x0 (null) in the provided GDB trace [1]. This null pointer dereference causes a segmentation fault (SIGSEGV), crashing the interpreter.

Exploitation

An attacker can exploit this issue by supplying a specially crafted WebAssembly module that triggers the vulnerable code path. No authentication or special privileges are required; the crash occurs simply when the module is loaded and executed by WASM3. The attack surface is broad because WASM3 is designed to run untrusted WebAssembly in various environments, including browsers, embedded systems, and server-side applications [2].

Impact

Successful exploitation results in a denial of service (DoS) condition, as the interpreter crashes and becomes unavailable. Since WASM3 is used as a library in multiple languages (Python, Rust, C/C++, etc.) [2], a crash can affect any application that embeds the runtime. The Python package pywasm3 is also affected, as noted in the PyPI advisory database [4].

Mitigation

As of the publication date, no official patch has been released. The WASM3 project has entered a minimal maintenance phase due to the maintainer's personal circumstances [2], so fixes may be delayed. Users are advised to avoid processing untrusted WebAssembly modules until a patch is available. Workarounds include sandboxing the interpreter or using alternative runtimes.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pywasm3PyPI
<= 0.5.0
wasm3crates.io
<= 0.5.0

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.