Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-24889
January 28, 2026
soroban-sdk is a Rust SDK for Soroban contracts. Arithmetic overflow can be triggered in the "Bytes::slice", "Vec::slice", and "Prng::gen_range" (for "u64") methods in the "soroban-sdk" in versions up to and including "25.0.1", "23.5.1", and "25.0.2". Contracts that pass user-controlled or computed range bounds to "Bytes::slice", "Vec::slice", or "Prng::gen_range" may silently operate on incorrect data ranges or generate random numbers from an unintended range, potentially resulting in corrupted contract state. Note that the best practice when using the "soroban-sdk" and building Soroban contracts is to always enable "overflow-checks = true". The "stellar contract init" tool that prepares the boiler plate for a Soroban contract, as well as all examples and docs, encourage the use of configuring "overflow-checks = true" on "release" profiles so that these arithmetic operations fail rather than silently wrap. Contracts are only impacted if they use "overflow-checks = false" either explicitly or implicitly. It is anticipated the majority of contracts could not be impacted because the best practice encouraged by tooling is to enable "overflow-checks". The fix available in "25.0.1", "23.5.1", and "25.0.2" replaces bare arithmetic with "checked_add" / "checked_sub", ensuring overflow traps regardless of the "overflow-checks" profile setting. As a workaround, contract workspaces can be configured with a profile available in the GitHub Securtity Advisory to enable overflow checks on the arithmetic operations. This is the best practice when developing Soroban contracts, and the default if using the contract boilerplate generated using "stellar contract init". Alternatively, contracts can validate range bounds before passing them to "slice" or "gen_range" to ensure the conversions cannot overflow.
Affected Packages
https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v23.0.0 <v23.5.1
Fix Suggestion:
Update to version v23.5.1
https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.0.2
Fix Suggestion:
Update to version v25.0.2
https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v0.0.3 <v22.0.9
Fix Suggestion:
Update to version v22.0.9
soroban-sdk (RUST):
Affected version(s) >=25.0.0 <25.0.2
Fix Suggestion:
Update to version 25.0.2
soroban-sdk (RUST):
Affected version(s) >=23.0.0 <23.5.1
Fix Suggestion:
Update to version 23.5.1
soroban-sdk (RUST):
Affected version(s) >=0.0.1 <22.0.9
Fix Suggestion:
Update to version 22.0.9
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Integer Overflow or Wraparound
EPSS
Base Score:
0.02