Improper Check or Handling of Exceptional Conditions Affecting vyper package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-VYPER-8623829
  • published15 Jan 2025
  • disclosed14 Jan 2025
  • creditHubert Ritzdorf

Introduced: 14 Jan 2025

NewCVE-2025-21607  (opens in a new tab)
CWE-703  (opens in a new tab)

How to fix?

There is no fixed version for vyper.

Overview

vyper is a Pythonic Smart Contract Language for the EVM.

Affected versions of this package are vulnerable to Improper Check or Handling of Exceptional Conditions due to a failure to verify the success flag of calls to the precompiles EcRecover (0x1) and Identity (0x4). An attacker can exploit this by providing a specific amount of gas to intentionally make these calls fail while allowing the overall execution to continue.

References

CVSS Scores

version 4.0
version 3.1