CVE-2025-47774: Vyper's `slice()` may elide side-effects when output length is 0
the slice()
builtin can elide side effects when the output length is 0, and the source bytestring is a builtin (msg.data
or <address>.code
). the reason is that for these source locations, the check that length >= 1
is skipped:
https://github.com/vyperlang/vyper/blob/68b68c4b30c5ef2f312b4674676170b8a6eaa316/vyper/builtins/functions.py#L315-L319
the result is that a 0-length bytestring constructed with slice can be passed to make_byte_array_copier
, which elides evaluation of its source argument when the max length is 0:
https://github.com/vyperlang/vyper/blob/68b68c4b30c5ef2f312b4674676170b8a6eaa316/vyper/codegen/core.py#L189-L191
the impact is that side effects in the start
argument may be elided when the length
argument is 0, e.g. slice(msg.data, self.do_side_effect(), 0)
.
the following example illustrates how the issue would look in user code
counter: public(uint256)
@external
def test() -> Bytes[10]:
b: Bytes[10] = slice(msg.data, self.side_effect(), 0)
return b
def side_effect() -> uint256:
self.counter += 1
return 0
the severity assigned is low, since this is not a very useful pattern and unlikely to be found in user code.
References
- github.com/advisories/GHSA-3vcg-j39x-cwfm
- github.com/vyperlang/vyper
- github.com/vyperlang/vyper/blob/68b68c4b30c5ef2f312b4674676170b8a6eaa316/vyper/builtins/functions.py
- github.com/vyperlang/vyper/blob/68b68c4b30c5ef2f312b4674676170b8a6eaa316/vyper/codegen/core.py
- github.com/vyperlang/vyper/pull/4645
- github.com/vyperlang/vyper/security/advisories/GHSA-3vcg-j39x-cwfm
- nvd.nist.gov/vuln/detail/CVE-2025-47774
Code Behaviors & Features
Detect and mitigate CVE-2025-47774 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →