An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tOTljLXEyNnItbTdtN84AA7I6

Evmos vulnerable to unauthorized account creation with vesting module


What kind of vulnerability is it? Who is impacted?

Using the vesting module, a malicious attacker can create a new vesting account at a given
address, before a contract is created on that address.

Addresses of smart contracts deployed to the EVM are deterministic. Therefore, it would be possible for an attacker to front-run a contract creation and create a vesting account at that address.
When an address has been initialized without any contract code deployed to it, it will not be possible to upload any afterwards. In the described attack, this would mean that a malicious actor could prevent smart contracts from being deployed correctly.

In order to remediate this, an alternative user flow is being implemented for the vesting module:


Has the problem been patched? What versions should users upgrade to?


Is there a way for users to fix or remediate the vulnerability without upgrading?


Are there any links users can visit to find out more?

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 month ago
Updated: about 1 month ago

Identifiers: GHSA-m99c-q26r-m7m7
References: Repository:
Blast Radius: 1.0

Affected Packages
Dependent packages: 9
Dependent repositories: 0
Affected Version Ranges: <= 13.0.2
No known fixed version
All affected versions: 13.0.0, 13.0.1, 13.0.2
Affected Version Ranges: <= 13.0.2
No known fixed version