logo

CVE-2025-53359 ethereum

Package

Manager: cargo
Name: ethereum
Vulnerable Version: >=0 <0.18.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00057 pctl0.178

Details

ethereum does not check transaction malleability for EIP-2930, EIP-1559 and EIP-7702 transactions ### Impact Prior to `ethereum` crate v0.18.0, signature malleability (according to EIP-2) was only checked for "legacy" transactions, but not for EIP-2930, EIP-1559 and EIP-7702 transactions. This is a specification deviation and therefore a high severity advisory if the `ethereum` crate is used for Ethereum mainnet. Note that signature malleability itself is not a security issue, and therefore if the `ethereum` crate is used on a single-implementation blockchain, it's a low/informational severity advisory. ### Patches The issue is fixed in `ethereum` v0.18.0 ### Workarounds You can also manually check transaction malleability outside of the crate. But it's recommended to simply upgrade the version. ### References See PR: https://github.com/rust-ethereum/ethereum/pull/67

Metadata

Created: 2025-07-02T15:12:18Z
Modified: 2025-07-02T18:59:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-3w94-vq2x-v5wr/GHSA-3w94-vq2x-v5wr.json
CWE IDs: ["CWE-754"]
Alternative ID: GHSA-3w94-vq2x-v5wr
Finding: F002
Auto approve: 1