Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29795: CWE-770: Allocation of Resources Without Limits or Throttling in stellar rs-stellar-xdr

0
Medium
VulnerabilityCVE-2026-29795cvecve-2026-29795cwe-770
Published: Fri Mar 06 2026 (03/06/2026, 20:42:43 UTC)
Source: CVE Database V5
Vendor/Project: stellar
Product: rs-stellar-xdr

Description

stellar-xdr is a library and CLI containing types and functionality for working with Stellar XDR. Prior to version 25.0.1, StringM::from_str does not validate that the input length is within the declared maximum (MAX). Calling StringM::<N>::from_str(s) where s is longer than N bytes succeeds and returns an Ok value instead of Err(Error::LengthExceedsMax), producing a StringM that violates its length invariant. This affects any code that constructs StringM values from string input using FromStr (including str::parse), and relies on the type's maximum length constraint being enforced. An oversized StringM could propagate through serialization, validation, or other logic that assumes the invariant holds. This issue has been patched in version 25.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:42:24 UTC

Technical Analysis

The vulnerability CVE-2026-29795 affects the rs-stellar-xdr library, a Rust implementation used for handling Stellar XDR data types. Specifically, the StringM::from_str method fails to validate that input strings conform to the declared maximum length (MAX). When a string longer than the maximum allowed length N is passed, the method incorrectly returns a successful result instead of an error, thereby creating a StringM instance that violates its length invariant. This flaw impacts any code that constructs StringM values from string inputs using FromStr or str::parse and relies on the maximum length constraint for correctness. The consequence is that oversized strings can propagate through serialization, validation, or other logic that assumes the length invariant holds, potentially causing unexpected behavior or logic errors. The root cause is a lack of proper input validation and resource allocation limits, categorized under CWE-770. The vulnerability does not directly expose sensitive data or cause denial of service but undermines data integrity by allowing invalid data states. The issue was addressed and patched in version 25.0.1 of the library. No public exploits or active attacks have been reported to date.

Potential Impact

The primary impact of this vulnerability is on data integrity within applications using the affected rs-stellar-xdr library versions. By allowing oversized strings to bypass length checks, applications may process malformed or unexpected data, potentially leading to logic errors, incorrect transaction processing, or corrupted data states. While this does not directly compromise confidentiality or availability, it can undermine trust in data correctness and cause downstream application failures or inconsistencies. Organizations relying on Stellar blockchain infrastructure or applications built on rs-stellar-xdr may experience subtle bugs or validation failures that could affect transaction integrity or system reliability. Since exploitation requires only local access to input string construction functions and no privileges or user interaction, the risk is moderate. However, the scope is limited to software components using the vulnerable library versions, and the absence of known exploits reduces immediate threat levels. Nonetheless, the vulnerability should be addressed promptly to maintain data integrity and prevent potential future exploitation scenarios.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all instances of the rs-stellar-xdr library to version 25.0.1 or later, where the input length validation issue has been fixed. Developers should audit their codebases to identify any usage of StringM::from_str or related parsing methods that construct StringM values from untrusted input and ensure proper input validation is enforced. Implement additional input sanitization and length checks at higher application layers to prevent oversized strings from reaching the vulnerable code paths. Incorporate fuzz testing and static analysis tools to detect similar resource allocation or input validation issues in related code. Monitor for updates from the Stellar project and subscribe to security advisories to stay informed about any emerging exploits or patches. Finally, conduct thorough testing of serialization and validation logic to confirm that length invariants are correctly enforced and that malformed data cannot propagate through the system.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ab4093c48b3f10ffd6ce0b

Added to database: 3/6/2026, 9:01:07 PM

Last enriched: 3/14/2026, 7:42:24 PM

Last updated: 4/20/2026, 3:46:37 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses