Vulnerability Description
gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, leading to a signature malleability vulnerability. Because gnark’s native EdDSA and ECDSA circuits lack essential constraints, multiple distinct witnesses can satisfy the same public inputs. In protocols where nullifiers or anti-replay checks are derived from R and S, this enables signature malleability and may allow double spending. This issue has been addressed in version 0.14.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Consensys | Gnark | < 0.14.0 |
Related Weaknesses (CWE)
References
- https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d8271Patch
- https://github.com/Consensys/gnark/security/advisories/GHSA-95v9-hv42-pwrjExploitVendor Advisory
FAQ
What is CVE-2025-57801?
CVE-2025-57801 is a vulnerability with a CVSS score of 9.1 (CRITICAL). gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, lead...
How severe is CVE-2025-57801?
CVE-2025-57801 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-57801?
Check the references section above for vendor advisories and patch information. Affected products include: Consensys Gnark.