Babylon contributors have disclosed a vulnerability in the BLS voting extension mechanism, affecting versions prior to 4.2.0.

This article is machine translated
Show original

According to a Foresight News report, a Babylon GitHub post disclosed by contributor @GrumpyLaurie55348 on December 9, 2025, reveals a vulnerability in Babylon's BLS voting extension mechanism. This vulnerability could allow malicious validators to interfere with the network consensus process. An attacker could intentionally omit the block hash field when sending blocks, causing other validators to crash at network cycle boundaries, thus slowing down block production. The vulnerability is rated as high severity, affecting versions prior to 4.2.0. No user reports of exploitation have been received to date.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments