Description

vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statements by first caching the target location to avoid double evaluation. However, in the case when target is an access to a DynArray and the rhs modifies the array, the cached target will evaluate first, and the bounds check will not be re-evaluated during the write portion of the statement. This issue has been addressed in version 0.4.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

INFO

Published Date :

2025-02-21T21:27:28.056Z

Last Modified :

2025-02-22T15:37:28.734Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-27105 vulnerability.

Vendors Products
Vyperlang
  • Vyper
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27105.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact