Uncaught Exception Affecting alloy-dyn-abi package, versions <0.8.26>=1.0.0-rc.1 <1.4.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Uncaught Exception vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-ALLOYDYNABI-13568807
  • published16 Oct 2025
  • disclosed15 Oct 2025
  • creditZeke Mostov, cr-tk

Introduced: 15 Oct 2025

NewCVE-2025-62370  (opens in a new tab)
CWE-248  (opens in a new tab)

How to fix?

Upgrade alloy-dyn-abi to version 0.8.26, 1.4.1 or higher.

Overview

alloy-dyn-abi is a Dynamic Solidity type encoder.

Run-time representation of Ethereum's type system with ABI encoding & decoding.

This library provides a runtime encoder/decoder for solidity types. It is intended to be used when the solidity type is not known at compile time. This is particularly useful for EIP-712 signing interfaces.

We strongly recommend using the static encoder/decoder when possible. The dynamic encoder/decoder is significantly more expensive, especially for complex types. It is also significantly more error prone, as the mapping between solidity types and rust types is not enforced by the compiler.

Affected versions of this package are vulnerable to Uncaught Exception via the alloy_dyn_abi::TypedData function when malformed input is provided to eip712_signing_hash. An attacker can cause a panic that results in service disruption by submitting specially crafted input.

CVSS Base Scores

version 4.0
version 3.1