Execution Flaw in Vyper Smart Contract Language for EVM
CVE-2025-27104

2.3LOW

Key Information:

Vendor

Vyperlang

Status
Vendor
CVE Published:
21 February 2025

What is CVE-2025-27104?

The Vyper smart contract language for the Ethereum Virtual Machine (EVM) is susceptible to an execution flaw that involves multiple evaluations of a single expression in the iterator target of a for loop. Although the iterator expression itself does not allow for multiple writes, it can read side effects from the loop body, potentially causing erroneous results. Specifically, iterator reads that include conditional expressions may lead to interleaved read and write actions within the loop, resulting in unexpected behaviors in smart contract execution. Developers are strongly advised to upgrade to version 0.4.1, which is expected to resolve this issue, as there are no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

vyper < 0.4.1

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.