Home

Description

Alloy Core libraries at the root of the Rust Ethereum ecosystem. Prior to 0.8.26 and 1.4.1, an uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash(). Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible. The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

PUBLISHED Reserved 2025-10-10 | Published 2025-10-15 | Updated 2025-10-15 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-248: Uncaught Exception

Product status

< 0.8.26
affected

>= 1.0.0, < 1.4.1
affected

References

github.com/...s/core/security/advisories/GHSA-pgp9-98jm-wwq2

github.com/...ommit/7823e9af8c20e9fcfb5360f5eafd891c457ebccf

crates.io/crates/alloy-dyn-abi/0.8.26

crates.io/crates/alloy-dyn-abi/1.4.1

rustsec.org/advisories/RUSTSEC-2025-0073.html

cve.org (CVE-2025-62370)

nvd.nist.gov (CVE-2025-62370)

Download JSON