Home

Description

go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9.

PUBLISHED Reserved 2025-09-23 | Published 2025-09-29 | Updated 2025-09-30 | Assigner GitHub_M




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

Problem types

CWE-305: Authentication Bypass by Primary Weakness

Product status

< 0.8.9
affected

References

github.com/.../go-f3/security/advisories/GHSA-7pq9-rf9p-wcrf

github.com/...ommit/76fff18cf07b21baccf537024bdb2fb41f75f6e2

cve.org (CVE-2025-59941)

nvd.nist.gov (CVE-2025-59941)

Download JSON