CVSS 3.1 Score 2.9 of 10 (low)


Published Jun 19, 2024
Updated: Jun 20, 2024


CVE-2024-38358 is a vulnerability in Wasmer, a web assembly (wasm) Runtime supporting WASIX, WASI, and Emscripten. The vulnerability allows WASI programs to access the host filesystem if the preopened directory has a symlink pointing outside and the caller sets both `oflags::creat` and `rights::fd_write`. Additionally, the runtime can be crashed by creating a symlink pointing outside with `path_symlink` and `path_opening` the link. The issue has been addressed in commit `b9483d022`, which is included in release version 4.3.2. To remediate this vulnerability, users are advised to upgrade to the latest version of Wasmer. There are no known workarounds for this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-38358 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions