A vulnerability exists in go-f3's justification verification caching mechanism where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by: 1. First submitting a valid message with a correct justification 2. Then reusing the same cached justification in contexts where it would normally be invalid
This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with.
The fix was merged and released with go-f3 0.8.9. All node software (Lotus, Forest, Venus) are using a patched version of go-f3 with their updates for the nv27 network upgrade.
The are no immediate workarounds available. Nodes should upgrade to the patched version, which they will have done if participating in nv27 on Filecoin mainnet.
The bug was reported by @lgprbs via our bug bounty program. Thank you for the contributions.
{ "cwe_ids": [ "CWE-305" ], "github_reviewed": true, "nvd_published_at": "2025-09-29T23:15:32Z", "github_reviewed_at": "2025-09-29T20:40:02Z", "severity": "MODERATE" }