Vulnerability Description
Alloy Core libraries at the root of the Rust Ethereum ecosystem. Prior to 0.8.26 and 1.4.1, an uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash(). Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible. The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://crates.io/crates/alloy-dyn-abi/0.8.26
- https://crates.io/crates/alloy-dyn-abi/1.4.1
- https://github.com/alloy-rs/core/commit/7823e9af8c20e9fcfb5360f5eafd891c457ebccf
- https://github.com/alloy-rs/core/security/advisories/GHSA-pgp9-98jm-wwq2
- https://rustsec.org/advisories/RUSTSEC-2025-0073.html
FAQ
What is CVE-2025-62370?
CVE-2025-62370 is a vulnerability with a CVSS score of 7.5 (HIGH). Alloy Core libraries at the root of the Rust Ethereum ecosystem. Prior to 0.8.26 and 1.4.1, an uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service...
How severe is CVE-2025-62370?
CVE-2025-62370 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62370?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.