
We found results for “”
CVE-2025-59941
Good to know:


Date: September 29, 2025
go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Authentication Bypass by Primary Weakness
CWE-305Top Fix

Upgrade Version
Upgrade to version github.com/filecoin-project/go-f3 - v0.8.9;github.com/filecoin-project/go-f3 - v0.8.9;https://github.com/filecoin-project/go-f3.git - v0.8.9
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | LOW |