CVE-2026-24889: CWE-190: Integer Overflow or Wraparound in stellar rs-soroban-sdk
CVE-2026-24889 is an integer overflow vulnerability in the stellar rs-soroban-sdk affecting versions prior to 22. 0. 9, between 23. 0. 0 and 23. 5. 1, and between 25. 0. 0 and 25. 0.
AI Analysis
Technical Summary
The vulnerability CVE-2026-24889 affects the stellar rs-soroban-sdk, a Rust software development kit used for building Soroban smart contracts on the Stellar blockchain platform. The issue is an integer overflow or wraparound (CWE-190) that can be triggered in the Bytes::slice, Vec::slice, and Prng::gen_range methods when arithmetic operations on range bounds overflow silently. This occurs if contracts pass user-controlled or computed range values without proper validation or without enabling Rust's overflow checks. Specifically, if overflow-checks are disabled (overflow-checks = false), arithmetic operations may wrap around without error, causing slices or random number generation to operate on incorrect data ranges. This can lead to corrupted contract state or unintended behavior in contract logic. The vulnerability affects multiple versions of the SDK, including versions before 22.0.9, between 23.0.0 and 23.5.1, and between 25.0.0 and 25.0.2. The recommended fix replaces bare arithmetic with checked arithmetic methods (checked_add, checked_sub) that trap on overflow regardless of overflow-checks settings. The official tooling and boilerplate generated by the stellar contract init tool encourage enabling overflow checks by default, reducing the likelihood of exploitation. However, contracts that explicitly or implicitly disable overflow checks remain vulnerable. No known exploits have been reported in the wild. The CVSS 3.1 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity loss without affecting confidentiality or availability.
Potential Impact
For European organizations developing or deploying Soroban smart contracts using the vulnerable rs-soroban-sdk versions, this vulnerability could lead to silent corruption of contract state or incorrect random number generation. This may cause logic errors, financial discrepancies, or unintended contract behavior, undermining trust and reliability in blockchain applications. While the vulnerability does not directly compromise confidentiality or availability, integrity issues in smart contracts can have significant financial and reputational consequences, especially in sectors like finance, supply chain, and digital identity where Stellar-based contracts may be used. The impact is mitigated if overflow checks are enabled, which is the recommended default. Organizations relying on custom or legacy contracts that disable overflow checks are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, particularly as attackers may develop exploits targeting contracts with disabled overflow checks. European blockchain developers and enterprises should prioritize updating SDK versions and enforcing overflow checks to maintain contract integrity.
Mitigation Recommendations
1. Immediately upgrade rs-soroban-sdk to a patched version beyond 25.0.2 or the latest secure release that includes checked arithmetic operations. 2. Ensure all Soroban contract development environments and build profiles enable Rust's overflow checks (overflow-checks = true), especially in release builds. 3. Review existing contracts to verify that overflow checks are enabled and that no user-controlled inputs are passed unchecked to Bytes::slice, Vec::slice, or Prng::gen_range methods. 4. Implement explicit validation of range bounds before passing them to slicing or random number generation functions to prevent overflow conditions. 5. Use the official stellar contract init tool to generate boilerplate code that enforces best practices. 6. Conduct thorough testing and code audits focusing on arithmetic operations and boundary conditions in smart contracts. 7. Monitor updates from Stellar and the rs-soroban-sdk project for further patches or advisories. 8. Educate developers on the risks of disabling overflow checks and the importance of safe arithmetic in smart contract development.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Estonia
CVE-2026-24889: CWE-190: Integer Overflow or Wraparound in stellar rs-soroban-sdk
Description
CVE-2026-24889 is an integer overflow vulnerability in the stellar rs-soroban-sdk affecting versions prior to 22. 0. 9, between 23. 0. 0 and 23. 5. 1, and between 25. 0. 0 and 25. 0.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-24889 affects the stellar rs-soroban-sdk, a Rust software development kit used for building Soroban smart contracts on the Stellar blockchain platform. The issue is an integer overflow or wraparound (CWE-190) that can be triggered in the Bytes::slice, Vec::slice, and Prng::gen_range methods when arithmetic operations on range bounds overflow silently. This occurs if contracts pass user-controlled or computed range values without proper validation or without enabling Rust's overflow checks. Specifically, if overflow-checks are disabled (overflow-checks = false), arithmetic operations may wrap around without error, causing slices or random number generation to operate on incorrect data ranges. This can lead to corrupted contract state or unintended behavior in contract logic. The vulnerability affects multiple versions of the SDK, including versions before 22.0.9, between 23.0.0 and 23.5.1, and between 25.0.0 and 25.0.2. The recommended fix replaces bare arithmetic with checked arithmetic methods (checked_add, checked_sub) that trap on overflow regardless of overflow-checks settings. The official tooling and boilerplate generated by the stellar contract init tool encourage enabling overflow checks by default, reducing the likelihood of exploitation. However, contracts that explicitly or implicitly disable overflow checks remain vulnerable. No known exploits have been reported in the wild. The CVSS 3.1 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity loss without affecting confidentiality or availability.
Potential Impact
For European organizations developing or deploying Soroban smart contracts using the vulnerable rs-soroban-sdk versions, this vulnerability could lead to silent corruption of contract state or incorrect random number generation. This may cause logic errors, financial discrepancies, or unintended contract behavior, undermining trust and reliability in blockchain applications. While the vulnerability does not directly compromise confidentiality or availability, integrity issues in smart contracts can have significant financial and reputational consequences, especially in sectors like finance, supply chain, and digital identity where Stellar-based contracts may be used. The impact is mitigated if overflow checks are enabled, which is the recommended default. Organizations relying on custom or legacy contracts that disable overflow checks are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, particularly as attackers may develop exploits targeting contracts with disabled overflow checks. European blockchain developers and enterprises should prioritize updating SDK versions and enforcing overflow checks to maintain contract integrity.
Mitigation Recommendations
1. Immediately upgrade rs-soroban-sdk to a patched version beyond 25.0.2 or the latest secure release that includes checked arithmetic operations. 2. Ensure all Soroban contract development environments and build profiles enable Rust's overflow checks (overflow-checks = true), especially in release builds. 3. Review existing contracts to verify that overflow checks are enabled and that no user-controlled inputs are passed unchecked to Bytes::slice, Vec::slice, or Prng::gen_range methods. 4. Implement explicit validation of range bounds before passing them to slicing or random number generation functions to prevent overflow conditions. 5. Use the official stellar contract init tool to generate boilerplate code that enforces best practices. 6. Conduct thorough testing and code audits focusing on arithmetic operations and boundary conditions in smart contracts. 7. Monitor updates from Stellar and the rs-soroban-sdk project for further patches or advisories. 8. Educate developers on the risks of disabling overflow checks and the importance of safe arithmetic in smart contract development.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-27T19:35:20.528Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697a889e4623b1157cf358fa
Added to database: 1/28/2026, 10:07:26 PM
Last enriched: 1/28/2026, 10:20:17 PM
Last updated: 1/28/2026, 11:11:22 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1550: Improper Authorization in PHPGurukul Hospital Management System
MediumCVE-2026-1549: Path Traversal in jishenghua jshERP
MediumCVE-2025-31135: CWE-20: Improper Input Validation in phires go-guerrilla
MediumCVE-2026-1548: Command Injection in Totolink A7000R
MediumCVE-2026-24897: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ErugoOSS Erugo
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.