Home

Description

soroban-poseidon provides Poseidon and Poseidon2 cryptographic hash functions for Soroban smart contracts. Poseidon V1 (PoseidonSponge) accepts variable-length inputs without injective padding. When a caller provides fewer inputs than the sponge rate (inputs.len() < T - 1), unused rate positions are implicitly zero-filled. This allows trivial hash collisions: for any input vector [m1, ..., mk] hashed with a sponge of rate > k, hash([m1, ..., mk]) equals hash([m1, ..., mk, 0]) because both produce identical pre-permutation states. This affects any use of PoseidonSponge or poseidon_hash where the number of inputs is less than T - 1 (e.g., hashing 1 input with T=3). Poseidon2 (Poseidon2Sponge) is not affected.

PUBLISHED Reserved 2026-03-10 | Published 2026-03-12 | Updated 2026-03-13 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-328: Use of Weak Hash

Product status

< 25.0.1
affected

References

github.com/...seidon/security/advisories/GHSA-g2p6-hh5v-7hfm

github.com/stellar/rs-soroban-poseidon/pull/10

github.com/stellar/rs-soroban-poseidon/releases/tag/v25.0.1

cve.org (CVE-2026-32129)

nvd.nist.gov (CVE-2026-32129)

Download JSON