A vulnerability exists in Babylon’s BLS vote extension processing where a malicious active validator can submit a VoteExtension with the block_hash field omitted from the protobuf serialization. Because protobuf fields are optional, unmarshalling succeeds but leaves BlockHash as nil. Babylon then dereferences this nil pointer in consensus-critical code paths (notably VerifyVoteExtension, and also proposal-time vote verification), causing a runtime panic.
Intermittent validator crashes at epoch boundaries, which would slow down the creation of the epoch boundary block.
Vulnerability discovered by:
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-476"
],
"github_reviewed_at": "2025-12-08T22:20:24Z",
"severity": "HIGH",
"github_reviewed": true
}