Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pgp9-98jm-wwq2 | alloy-dyn-abi has DoS vulnerability on `alloy_dyn_abi::TypedData` hashing |
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alloy-rs
Alloy-rs core Rust-lang Rust-lang rust |
|
| Vendors & Products |
Alloy-rs
Alloy-rs core Rust-lang Rust-lang rust |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Alloy Core libraries at the root of the Rust Ethereum ecosystem. Prior to 0.8.26 and 1.4.1, an uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash(). Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible. The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26. | |
| Title | Alloy Core has a DoS vulnerability on `alloy_dyn_abi::TypedData` hashing | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-15T17:23:13.068Z
Reserved: 2025-10-10T14:22:48.204Z
Link: CVE-2025-62370
Updated: 2025-10-15T17:23:00.087Z
Status : Deferred
Published: 2025-10-15T16:15:36.183
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62370
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:09:21Z
Github GHSA