Vulnerability DatabaseGHSA-m6w8-fq7v-ph4m

GHSA-m6w8-fq7v-ph4m
JavaScript vulnerability analysis and mitigation

Overview

The GovernorCompatibilityBravo module vulnerability (GHSA-m6w8-fq7v-ph4m) was discovered and disclosed on January 11, 2022, affecting OpenZeppelin contracts versions 4.3.0 to 4.4.2. This moderate severity vulnerability impacts both @openzeppelin/contracts and @openzeppelin/contracts-upgradeable packages (GitHub Advisory).

Technical details

The vulnerability stems from incorrect ABI encoding in the GovernorCompatibilityBravo module when creating governance proposals using explicit function signatures. For example, when invoking a function foo(uint256) using propose([target], [0], ["foo(uint256)"], ["0x00..01"]), the arguments may be incorrectly encoded. However, the issue does not occur when the function selector is provided as part of the encoded proposal data, such as propose([target], [0], ["0x2fbebd3800..01"]) where 2fbebd38 represents the function selector (GitHub Advisory).

Impact

The vulnerability could result in governance proposals executing function calls with incorrect arguments due to bad ABI encoding. However, OpenZeppelin's assessment of on-chain instances found no occurrences of this bug in production. Additionally, proposal creation through Tally or OpenZeppelin Defender was not affected, and the core Governor contract remained uncompromised (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 4.4.2 of both @openzeppelin/contracts and @openzeppelin/contracts-upgradeable packages. As a workaround, users are advised to avoid creating proposals using explicit function signatures. Instead, they should use the propose function without the signatures argument and create proposals using fully ABI-encoded function calls that include the function selector in the calldatas argument (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-65513HIGH7.5
  • JavaScriptJavaScript
  • mcp-fetch-server
NoNoDec 09, 2025
CVE-2025-67716MEDIUM5.7
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 11, 2025
CVE-2025-67490MEDIUM5.4
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management