Description
gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, leading to a signature malleability vulnerability. Because gnark’s native EdDSA and ECDSA circuits lack essential constraints, multiple distinct witnesses can satisfy the same public inputs. In protocols where nullifiers or anti-replay checks are derived from R and S, this enables signature malleability and may allow double spending. This issue has been addressed in version 0.14.0.
INFO
Published Date :
2025-08-22T19:54:05.854Z
Last Modified :
2025-08-22T20:06:00.913Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-57801 vulnerability.
| Vendors | Products |
|---|---|
| Consensys |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-57801.