soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field elements to compare as not-equal when one or both values were unreduced (i.e., >= r). The vulnerability requires an attacker to supply crafted Fr values through contract inputs, and compare them directly without going through host-side arithmetic operations. Smart contracts that rely on Fr equality checks for security-critical logic could produce incorrect results. The impact depends on how the affected contract uses Fr equality comparisons, but can result in incorrect authorization decisions or validation bypasses in contracts that perform equality checks on user-supplied scalar values. This vulnerability is fixed in 22.0.11, 23.5.3, and 25.3.0.
References
| Link | Resource |
|---|---|
| https://github.com/stellar/rs-soroban-sdk/security/advisories/GHSA-x2hw-px52-wp4m | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Mar 2026, 13:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/stellar/rs-soroban-sdk/security/advisories/GHSA-x2hw-px52-wp4m - Mitigation, Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:stellar:rs-soroban-sdk:*:*:*:*:*:rust:*:* | |
| First Time |
Stellar rs-soroban-sdk
Stellar |
13 Mar 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:54
Updated : 2026-03-19 13:37
NVD link : CVE-2026-32322
Mitre link : CVE-2026-32322
CVE.ORG link : CVE-2026-32322
JSON object : View
Products Affected
stellar
- rs-soroban-sdk
CWE
CWE-697
Incorrect Comparison
