Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-pgp9-98jm-wwq2: alloy-dyn-abi has DoS vulnerability on `alloy_dyn_abi::TypedData` hashing

Impact

An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash().

Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.

Patches

The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

Workarounds

There is no known workaround that mitigates the vulnerability. Upgrading to a patched version is the recommended course of action.

Reported by

Christian Reitter & Zeke Mostov from Turnkey

ghsa
#vulnerability#dos#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-62370

alloy-dyn-abi has DoS vulnerability on `alloy_dyn_abi::TypedData` hashing

High severity GitHub Reviewed Published Oct 15, 2025 in alloy-rs/core

Package

cargo alloy-dyn-abi (Rust)

Affected versions

< 0.8.26

>= 1.0.0, < 1.4.1

Patched versions

0.8.26

1.4.1

Impact

An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash().

Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.

Patches

The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

Workarounds

There is no known workaround that mitigates the vulnerability. Upgrading to a patched version is the recommended course of action.

Reported by

Christian Reitter & Zeke Mostov from Turnkey

References

  • GHSA-pgp9-98jm-wwq2
  • https://crates.io/crates/alloy-dyn-abi/0.8.26
  • https://crates.io/crates/alloy-dyn-abi/1.4.1
  • https://rustsec.org/advisories/RUSTSEC-2025-0073.html

Published to the GitHub Advisory Database

Oct 15, 2025

ghsa: Latest News

GHSA-rfh5-c9h5-q8jm: reflex-dev/reflex has an Open Redirect vulnerability