-
CVSS Score
-The vulnerability manifests in the propose function where array length validation was missing. The commit diff shows a critical require(signatures.length == calldatas.length) was added to propose(), and the loop in the private _encodeCalldata helper was changed from using signatures.length to calldatas.length. These changes directly address the root cause described in the advisory - improper input validation allowing mismatched array lengths. The test case added specifically targets this scenario, confirming the function's pre-patch vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| @openzeppelin/contracts | npm | >= 4.3.0, < 4.8.3 | 4.8.3 |
| @openzeppelin/contracts-upgradeable | npm | >= 4.3.0, < 4.8.3 | 4.8.3 |
A Semantic Attack on Google Gemini - Read the Latest Research