CVE-2026-8257

Published: Mag 11, 2026 Last Modified: Mag 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 1,9
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 3,3
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW 1,7
Access Vector: local
Access Complexity: low
Authentication: single
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

A vulnerability was detected in WebAssembly Binaryen up to 117. This issue affects the function IRBuilder::makeBrOn of the file src/wasm/wasm-ir-builder.cpp of the component BrOn Parser. Performing a manipulation results in reachable assertion. The attack needs to be approached locally. The exploit is now public and may be used. The patch is named 1251efbc1ea471c1311d2726b2bbe061ff2a291c. It is suggested to install a patch to address this issue.

617

Reachable Assertion

Draft
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: C, Java, Not Language-Specific, Rust
View CWE Details
https://github.com/HackC0der/CVE-Repos/blob/main/wasm-binaryen/Assertion_Failur…
https://github.com/WebAssembly/binaryen/
https://github.com/WebAssembly/binaryen/commit/1251efbc1ea471c1311d2726b2bbe061…
https://github.com/WebAssembly/binaryen/issues/8633
https://github.com/WebAssembly/binaryen/pull/8635
https://vuldb.com/submit/809552
https://vuldb.com/vuln/362554
https://vuldb.com/vuln/362554/cti