CVE-2026-34067

3.1 LOW
Published: April 22, 2026 Modified: April 24, 2026
View on NVD

Description

nimiq-transaction provides the transaction primitive to be used in Nimiq's Rust implementation. Prior to version 1.3.0, `HistoryTreeProof::verify` panics on a malformed proof where `history.len() != positions.len()` due to `assert_eq!(history.len(), positions.len())`. The proof object is derived from untrusted p2p responses (`ResponseTransactionsProof.proof`) and is therefore attacker-controlled at the network boundary until validated. A malicious peer could trigger a crash by returning a crafted inclusion proof with a length mismatch. The patch for this vulnerability is included as part of v1.3.0. No known workarounds are available.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/nimiq/core-rs-albatross/pull/3659
Source: security-advisories@github.com
Issue Tracking Patch
https://github.com/nimiq/core-rs-albatross/releases/tag/v1.3.0
Source: security-advisories@github.com
Release Notes
https://github.com/nimiq/core-rs-albatross/security/advisories/GHSA-264v-m8fm-76jm
Source: security-advisories@github.com
Patch Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
3.1 / 10.0
EPSS (Exploit Probability)
0.0%
1th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

nimiq