MEDIUM · 5.3

CVE-2023-40014

OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder ...

Vulnerability Description

OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder may see `_msgSender` return `address(0)` in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case for `MinimalForwarder` from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders. The problem has been patched in v4.9.3.

CVSS Score

5.3

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
OpenzeppelinOpenzeppelin Contracts>= 4.0.0, < 4.9.3
OpenzeppelinOpenzeppelin Contracts-Upgradable>= 4.0.0, < 4.9.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-40014?

CVE-2023-40014 is a vulnerability with a CVSS score of 5.3 (MEDIUM). OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder ...

How severe is CVE-2023-40014?

CVE-2023-40014 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-40014?

Check the references section above for vendor advisories and patch information. Affected products include: Openzeppelin Openzeppelin Contracts, Openzeppelin Openzeppelin Contracts-Upgradable.