CVE-2025-57801

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57801
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57801.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57801
Aliases
Published
2025-08-22T20:15:33Z
Modified
2025-08-29T15:42:12.717954Z
Summary
[none]
Details

gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, leading to a signature malleability vulnerability. Because gnark’s native EdDSA and ECDSA circuits lack essential constraints, multiple distinct witnesses can satisfy the same public inputs. In protocols where nullifiers or anti-replay checks are derived from R and S, this enables signature malleability and may allow double spending. This issue has been addressed in version 0.14.0.

References

Affected packages

Git / github.com/consensys/gnark

Affected ranges

Type
GIT
Repo
https://github.com/consensys/gnark
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-alpha
v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.2.0-alpha
v0.2.1-alpha
v0.3.0
v0.3.0-alpha
v0.3.1
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.4.0
v0.5.0
v0.5.1
v0.5.2
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.7.0
v0.7.1
v0.8.0
v0.8.1
v0.9.0
v0.9.0-alpha
v0.9.1