FIND-20260411-003 · 2026-04-11 · Innovation Veille
Wasmtime: 12 new RustSec advisories (RUSTSEC-2026-0085 through 0086+) — sandbox escape risks
cve
MEDIUM
On April 9, 2026, the RustSec advisory database received 12 new Wasmtime security advisories (RUSTSEC-2026-0085 and related). These include sandbox escape vulnerabilities, heap out-of-bounds reads in component string transcoding, host-side panics, and denial-of-service conditions. Wasmtime is the primary WebAssembly runtime for Rust. ODS does not currently use Wasmtime directly, but it may appear as a transitive dependency in some crates.
Source
https://rustsec.org/packages/wasmtime.html
ODS Impact
Low direct impact — ODS Rust services do not use Wasmtime as a direct dependency. However, any future serverless/plugin execution subsystem that might use WASM should track these advisories. Run `cargo tree | grep wasmtime` to verify absence.
Security Review
License: Apache-2.0 | Maintenance: ACTIVE | Risk: LOW | Recommendation: USE_WITH_CAUTION
Tags
rust
wasmtime
wasm
cve
security
sandbox