Improper Encoding or Escaping of Output Affecting @openzeppelin/contracts package, versions >=4.0.0 <4.9.3
Threat Intelligence
EPSS
0.11% (45th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-OPENZEPPELINCONTRACTS-5838352
- published 11 Aug 2023
- disclosed 10 Aug 2023
- credit Unknown
Introduced: 10 Aug 2023
CVE-2023-40014 Open this link in a new tabHow to fix?
Upgrade @openzeppelin/contracts
to version 4.9.3 or higher.
Overview
@openzeppelin/contracts is a library for contract development.
Affected versions of this package are vulnerable to Improper Encoding or Escaping of Output. Contracts using ERC2771Context
along with a custom trusted forwarder may see _msgSender
return address(0)
in calls that originate from the forwarder with calldata
shorter than 20 bytes.
Note:
This can lead to unintended consequences or incorrect behavior in smart contracts that rely on the accurate identification of the sender.
References
CVSS Scores
version 3.1