go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Filecoin
Filecoin go-f3 |
|
Vendors & Products |
Filecoin
Filecoin go-f3 |
Mon, 29 Sep 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | go-f3 is a Golang implementation of Fast Finality for Filecoin (F3). In versions 0.8.8 and below, go-f3's justification verification caching mechanism has a vulnerability where verification results are cached without properly considering the context of the message. An attacker can bypass justification verification by submitting a valid message with a correct justification and then reusing the same cached justification in contexts where it would normally be invalid. This occurs because the cached verification does not properly validate the relationship between the justification and the specific message context it's being used with. This issue is fixed in version 0.8.9. | |
Title | go-f3 is Vulnerable to Cached Justification Verification Bypass | |
Weaknesses | CWE-305 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-30T14:13:56.958Z
Reserved: 2025-09-23T14:33:49.505Z
Link: CVE-2025-59941

Updated: 2025-09-30T14:13:54.407Z

Status : Awaiting Analysis
Published: 2025-09-29T23:15:32.133
Modified: 2025-10-02T19:12:42.843
Link: CVE-2025-59941

No data.

Updated: 2025-09-30T08:47:42Z