Wasmtime can panic when adding excessive fields to a `wasi:http/types.fields` instance
Moderate severity
GitHub Reviewed
Published
Feb 24, 2026
in
bytecodealliance/wasmtime
•
Updated Feb 27, 2026
Package
Affected versions
< 24.0.6
>= 25.0.0, < 36.0.6
>= 37.0.0, < 40.0.4
Patched versions
24.0.6
36.0.6
40.0.4
Description
Published to the GitHub Advisory Database
Feb 24, 2026
Reviewed
Feb 24, 2026
Published by the National Vulnerability Database
Feb 24, 2026
Last updated
Feb 27, 2026
Impact
Wasmtime's implementation of the
wasi:http/types.fieldsresource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in thewasmtime-wasi-httpcrate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime.Patches
Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking.
Workarounds
There are no known workarounds at this time, embedders are encouraged to update to a patched version of Wasmtime.
Resources
http::HeaderMapReferences