Integer Overflow or Wraparound Affecting soroban-sdk package, versions <22.0.9>=23.0.0 <23.5.1>=25.0.0 <25.0.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-SOROBANSDK-15140964
  • published29 Jan 2026
  • disclosed28 Jan 2026
  • creditleighmcculloch

Introduced: 28 Jan 2026

NewCVE-2026-24889  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade soroban-sdk to version 22.0.9, 23.5.1, 25.0.2 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the Bytes::slice, Vec::slice, or Prng::gen_range functions. An attacker can corrupt contract state or cause unintended behavior by supplying user-controlled or computed range bounds that trigger arithmetic overflow.

Note: This is only exploitable if overflow-checks = false is set either explicitly or implicitly in the contract configuration.

Workaround

This vulnerability can be mitigated by enabling overflow checks in the contract workspace profile or by validating range bounds before passing them to slice or gen_range.

CVSS Base Scores

version 4.0
version 3.1