CVE-2025-54429
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-07-29
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| polkadot | frontier | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-704 | The product does not correctly convert an object, resource, or structure from one type to a different type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Polkadot Frontier involves an incorrect implementation of the CallableByContract mechanism, which determines whether certain precompiled contracts can be called by smart contracts. Specifically, the system mistakenly identified contract addresses created under CREATE or CREATE2 as externally owned accounts (EOA) instead of contract accounts. This misclassification affects users who implement custom precompiles relying on distinguishing between EOAs and contract accounts, potentially allowing unintended access paths. However, predefined precompiles in Frontier are not directly exploitable by this issue. The problem was fixed in version 0822030.
How can this vulnerability impact me? :
If you use custom precompile implementations that depend on correctly identifying account types (EOA vs. contract), this vulnerability could lead to incorrect access control, potentially allowing smart contracts to call precompiles they should not be able to. This could result in unintended behavior or security risks in your smart contract interactions. However, if you only use predefined precompiles, this vulnerability does not directly affect you.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Polkadot Frontier to version 0822030 or later, where the issue with CallableByContract implementation is fixed.