-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the improper use of the cosmos.query.v1.module_query_safe annotation on the SmartContractState RPC method. The commit diff shows this annotation was removed from query.proto, indicating it was the source of the vulnerability. The module_query_safe flag implies deterministic execution, but smart contract queries can execute arbitrary Wasm code that might be non-deterministic. Other changes in the commit (call depth limits, query stack checks) appear to be defensive programming improvements rather than direct vulnerability sources.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/CosmWasm/wasmd | go | = 0.52.0 | 0.53.0 |
KEV Misses 88% of Exploited CVEs- Get the report