Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-32322
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
soroban-sdk: `Fr` scalar field equality comparison bypasses modular reduction
Source: NVD (National Vulnerability Database)
Vulnerability Description
soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field elements to compare as not-equal when one or both values were unreduced (i.e., >= r). The vulnerability requires an attacker to supply crafted Fr values through contract inputs, and compare them directly without going through host-side arithmetic operations. Smart contracts that rely on Fr equality checks for security-critical logic could produce incorrect results. The impact depends on how the affected contract uses Fr equality comparisons, but can result in incorrect authorization decisions or validation bypasses in contracts that perform equality checks on user-supplied scalar values. This vulnerability is fixed in 22.0.11, 23.5.3, and 25.3.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的比较
Source: NVD (National Vulnerability Database)
Vulnerability Title
rs-soroban-sdk 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
rs-soroban-sdk是Stellar开源的一个Rust开发者工具包。 rs-soroban-sdk 22.0.11之前版本、23.5.3之前版本和25.3.0之前版本存在安全漏洞,该漏洞源于BN254和BLS12-381的Fr类型比较值未先进行模约简,可能导致依赖Fr相等性检查的安全关键逻辑产生错误结果,绕过授权决策或验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
stellarrs-soroban-sdk >= 25.0.0, < 25.3.0 -
II. Public POCs for CVE-2026-32322
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-32322
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-32322

No comments yet


Leave a comment