CVE-2025-62370

HIGH

Crates.io Alloy-dyn-abi < 0.8.26 - Denial of Service

Title source: rule
STIX 2.1

Description

Alloy Core libraries at the root of the Rust Ethereum ecosystem. Prior to 0.8.26 and 1.4.1, an uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash(). Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible. The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

Scores

CVSS v3 7.5
EPSS 0.0004
EPSS Percentile 10.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-248
Status published
Products (3)
alloy-rs/core < 0.8.26
alloy-rs/core >= 1.0.0, < 1.4.1
crates.io/alloy-dyn-abi 0 - 0.8.26crates.io
Published Oct 15, 2025
Tracked Since Feb 18, 2026