EUVD-2025-17086

| CVE-2025-48905 HIGH
2025-06-06 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17086
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
CVE Published
Jun 06, 2025 - 07:15 nvd
HIGH 8.1

Description

Wasm exception capture vulnerability in the arkweb v8 module Impact: Successful exploitation of this vulnerability may cause the failure to capture specific Wasm exception types.

Analysis

WebAssembly exception handling vulnerability in the arkweb v8 module that prevents proper capture of specific Wasm exception types, potentially allowing attackers to bypass security controls or trigger unexpected application behavior. The vulnerability affects arkweb's V8 integration layer and requires network access but high attack complexity to exploit. While the CVSS score of 8.1 indicates high severity with potential impacts to confidentiality, integrity, and availability, real-world exploitability depends on whether active exploitation or proof-of-concept code exists.

Technical Context

This vulnerability exists in arkweb's V8 (Chrome's JavaScript/WebAssembly engine) module, specifically in the exception handling mechanisms for WebAssembly. CWE-1068 (Initialization with Hard-Coded Network Resource Configuration Data) suggests the root cause involves improper initialization or configuration of Wasm exception capture handlers, potentially through hardcoded values that fail to accommodate all exception type scenarios. The arkweb project is a Chromium-based embedded browser engine, making this relevant to any system embedding arkweb for WebAssembly execution. The vulnerability manifests when the V8 engine attempts to capture and handle exceptions thrown by Wasm code—certain exception types may bypass the capture mechanism entirely, leading to unhandled exceptions that could crash the application or expose sensitive execution context.

Affected Products

arkweb (version information not specified in provided data; affected versions likely include recent builds incorporating the vulnerable V8 module). CPE data for arkweb v8 module would typically be CPE:2.3:a:google:v8:*:*:*:*:*:arkweb:*:* (exact version range requires vendor advisory). The vulnerability is component-level (V8 integration layer within arkweb) rather than OS-wide. Affected configurations include any system embedding arkweb with WebAssembly execution enabled, including Chromium-based browsers, embedded browsers in Android applications, and server-side Wasm runtimes using arkweb or bundled V8. No specific vendor advisory URLs provided in source data.

Remediation

1. Update arkweb to the patched version once released by the arkweb/Chromium project (monitor official release notes). 2. If immediate patching is unavailable, disable WebAssembly execution in arkweb or restrict Wasm code to trusted sources only. 3. Implement strict Content Security Policy (CSP) restrictions preventing untrusted Wasm module loading. 4. Run arkweb in a sandboxed environment with restricted permissions to limit blast radius if exception handling bypass occurs. 5. Monitor application logs for uncaught Wasm exceptions or unexpected crashes correlating with Wasm execution. 6. For embedded implementations, review V8 initialization code to ensure exception handlers are properly registered for all Wasm exception types. Patch availability and specific version numbers require consultation with official arkweb/Chromium security advisories.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: 0

Share

EUVD-2025-17086 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy