Vyper Vulnerability in Pythonic Smart Contract Language for EVM
CVE-2025-27105
2.3LOW
Key Information:
- Vendor
- Vyperlang
- Status
- Vyper
- Vendor
- CVE Published:
- 21 February 2025
Summary
The Vyper programming language for the Ethereum Virtual Machine (EVM) has a critical issue in how it processes AugAssign statements, specifically when targeting a dynamic array. In scenarios where the right-hand side (rhs) manipulates the array, the language caches the target location, thereby preventing proper bounds checking during the write operation. As a result, this flaw can lead to unintentional modifications and security risks within smart contracts. Users are strongly encouraged to update to version 0.4.1 to safeguard against potential exploits, as no workarounds exist.
Affected Version(s)
vyper < 0.4.1
References
CVSS V4
Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved