CVE-2026-32322
March 12, 2026
soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field elements to compare as not-equal when one or both values were unreduced (i.e., >= r). The vulnerability requires an attacker to supply crafted Fr values through contract inputs, and compare them directly without going through host-side arithmetic operations. Smart contracts that rely on Fr equality checks for security-critical logic could produce incorrect results. The impact depends on how the affected contract uses Fr equality comparisons, but can result in incorrect authorization decisions or validation bypasses in contracts that perform equality checks on user-supplied scalar values. This vulnerability is fixed in 22.0.11, 23.5.3, and 25.3.0.
Affected Packages
https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v23.5.0 <v23.5.3Fix Suggestion:
Update to version v23.5.3https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v22.0.0 <v22.0.11Fix Suggestion:
Update to version v22.0.11https://github.com/stellar/rs-soroban-sdk.git (GITHUB):
Affected version(s) >=v25.0.0 <v25.3.0Fix Suggestion:
Update to version v25.3.0soroban-sdk (RUST):
Affected version(s) >=25.0.0 <25.3.0Fix Suggestion:
Update to version 25.3.0soroban-sdk (RUST):
Affected version(s) >=23.0.0 <23.5.3Fix Suggestion:
Update to version 23.5.3soroban-sdk (RUST):
Affected version(s) >=0.0.1 <22.0.11Fix Suggestion:
Update to version 22.0.11Related ResourcesĀ (8)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Incorrect Comparison
EPSS
Base Score:
0.04