๐Ÿ” CVE Alert

CVE-2026-32129

UNKNOWN 0.0

Poseidon V1 variable-length input collision via implicit zero-padding

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

soroban-poseidon provides Poseidon and Poseidon2 cryptographic hash functions for Soroban smart contracts. Poseidon V1 (PoseidonSponge) accepts variable-length inputs without injective padding. When a caller provides fewer inputs than the sponge rate (inputs.len() < T - 1), unused rate positions are implicitly zero-filled. This allows trivial hash collisions: for any input vector [m1, ..., mk] hashed with a sponge of rate > k, hash([m1, ..., mk]) equals hash([m1, ..., mk, 0]) because both produce identical pre-permutation states. This affects any use of PoseidonSponge or poseidon_hash where the number of inputs is less than T - 1 (e.g., hashing 1 input with T=3). Poseidon2 (Poseidon2Sponge) is not affected.

CWE CWE-328
Vendor stellar
Product rs-soroban-poseidon
Published Mar 12, 2026
Last Updated Mar 13, 2026
Stay Ahead of the Next One

Get instant alerts for stellar rs-soroban-poseidon

Be the first to know when new unknown vulnerabilities affecting stellar rs-soroban-poseidon are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

stellar / rs-soroban-poseidon
< 25.0.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/stellar/rs-soroban-poseidon/security/advisories/GHSA-g2p6-hh5v-7hfm github.com: https://github.com/stellar/rs-soroban-poseidon/pull/10 github.com: https://github.com/stellar/rs-soroban-poseidon/releases/tag/v25.0.1