Vulnerability DatabaseGHSA-c873-wfhp-wx5m

GHSA-c873-wfhp-wx5m
Rust vulnerability analysis and mitigation

Overview

A high-severity vulnerability was discovered in SP1's STARK verifier affecting versions prior to 4.0.0. The vulnerability encompasses three main issues: missing validation checks in chipordering for preprocessed columns, underconstraint of the iscomplete boolean flag in the recursive verifier, and incorrect implementation of polynomial evaluation claims verification in the FRI-based polynomial commitment scheme. The vulnerability was identified through collaborative efforts from multiple teams including Succinct, Aligned, LambdaClass, 3MI Labs, and individual researchers Lev Soukhanov and Onur Kilic (GitHub Advisory).

Technical details

The vulnerability consists of three technical issues: First, the prover-provided chipordering lacked proper validation for preprocessed column indexes. Second, the iscomplete boolean flag in the recursive verifier was underconstrained, particularly in the first layer of recursion. Third, in the FRI-based polynomial commitment scheme implementation, evaluation claims were not properly observed into the challenger before sampling coefficients for random linear combinations. These issues were present in the STARK verifier implementation and its integration with the Plonky3 dependency (GitHub Advisory).

Impact

The vulnerability affects the soundness of both the Rust SDK for verifying compressed proofs and the on-chain verifier for deferred proofs. While the recursive verifier and on-chain verifier were protected from the chip_ordering vulnerability due to pre-generation and merkle proof verification of verifier programs, other components remained vulnerable (GitHub Advisory).

Mitigation and workarounds

The vulnerabilities were addressed in version 4.0.0 through multiple fixes: adding validation checks for chipordering by comparing indexed chip names with stored verifying key information, implementing proper assertcomplete function calls to constrain the is_complete flag, and correctly observing evaluation claims into the challenger in the Plonky3 integration. All previous versions have been deprecated and their verifiers frozen to prevent production use of vulnerable versions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management