Always-Incorrect Control Flow Implementation Affecting soroban-sdk-macros package, versions <22.0.10>=23.0.0 <23.5.2>=25.0.0 <25.1.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-SOROBANSDKMACROS-15325867
  • published23 Feb 2026
  • disclosed19 Feb 2026
  • creditnan_Zellic

Introduced: 19 Feb 2026

NewCVE-2026-26267  (opens in a new tab)
CWE-670  (opens in a new tab)

How to fix?

Upgrade soroban-sdk-macros to version 22.0.10, 23.5.2, 25.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation due to the #[contractimpl] macro generating calls to inherent functions instead of trait functions when names collide. An attacker can bypass critical security checks by invoking contract entry points that unintentionally call the inherent function, allowing unauthorized actions.

Workaround

This vulnerability can be mitigated by ensuring that no inherent associated function on the contract type shares a name with any function in the trait implementation, such as by renaming or removing the conflicting inherent function.

CVSS Base Scores

version 4.0
version 3.1