Allocation of Resources Without Limits or Throttling Affecting wasmcloud package, versions <2.0.1-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-WASMCLOUD-15856981
  • published31 Mar 2026
  • disclosed24 Feb 2026

Introduced: 24 Feb 2026

CVE-2026-27572  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Chainguard wasmcloud to version 2.0.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wasmcloud package and not the wasmcloud package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.6, 36.0.6, 4.0.04, 41.0.4, and 42.0.0, Wasmtime's implementation of the wasi:http/types.fields resource is susceptible to panics when too many fields are added to the set of headers. Wasmtime's implementation in the wasmtime-wasi-http crate is backed by a data structure which panics when it reaches excessive capacity and this condition was not handled gracefully in Wasmtime. Panicking in a WASI implementation is a Denial of Service vector for embedders and is treated as a security vulnerability in Wasmtime. Wasmtime 24.0.6, 36.0.6, 40.0.4, 41.0.4, and 42.0.0 patch this vulnerability and return a trap to the guest instead of panicking. There are no known workarounds at this time. Embedders are encouraged to update to a patched version of Wasmtime.

CVSS Base Scores

version 3.1