gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, leading to a signature malleability vulnerability. Because gnark’s native EdDSA and ECDSA circuits lack essential constraints, multiple distinct witnesses can satisfy the same public inputs. In protocols where nullifiers or anti-replay checks are derived from R and S, this enables signature malleability and may allow double spending. This issue has been addressed in version 0.14.0.
References
Link | Resource |
---|---|
https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e | Patch |
https://github.com/Consensys/gnark/security/advisories/GHSA-95v9-hv42-pwrj | Exploit Vendor Advisory |
Configurations
History
12 Sep 2025, 19:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:* | |
References | () https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e - Patch | |
References | () https://github.com/Consensys/gnark/security/advisories/GHSA-95v9-hv42-pwrj - Exploit, Vendor Advisory | |
First Time |
Consensys gnark
Consensys |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-22 20:15
Updated : 2025-09-12 19:05
NVD link : CVE-2025-57801
Mitre link : CVE-2025-57801
CVE.ORG link : CVE-2025-57801
JSON object : View
Products Affected
consensys
- gnark
CWE
CWE-347
Improper Verification of Cryptographic Signature