CVE-2025-61595
BaseFortify
Publication date: 2025-10-02
Last updated on: 2025-10-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| neutron-org | neutron | 8.0 |
| mantra-chain | mantrachain | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in MANTRA versions 4.0.1 and below, where the transaction gas limit is not enforced in its send hooks. As a result, send hooks can consume more gas than what remains in the transaction. When combined with recursive calls in the wasm contract, this can exponentially amplify gas consumption, potentially leading to resource exhaustion or denial of service. The issue is fixed in version 4.0.2.
How can this vulnerability impact me? :
The vulnerability can lead to excessive gas consumption during transaction processing, which may cause denial of service or resource exhaustion on the blockchain network. This can disrupt normal operations, increase transaction costs, or degrade performance.
What immediate steps should I take to mitigate this vulnerability?
Upgrade MANTRA to version 4.0.2 or later, as this version fixes the issue by enforcing the tx gas limit in send hooks.