{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:10:48.478","vulnerabilities":[{"cve":{"id":"CVE-2026-28402","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T22:16:23.343","lastModified":"2026-03-02T20:30:10.923","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.2.2, a malicious or compromised validator that is elected as proposer can publish a macro block proposal where `header.body_root` does not match the actual macro body hash. The proposal can pass proposal verification because the macro proposal verification path validates the header but does not validate the binding `body_root == hash(body)`; later code expects this binding and may panic on mismatch, crashing validators. Note that the impact is only for validator nodes. The patch for this vulnerability is formally released as part of v1.2.2. The patch adds the corresponding body root verification in the proposal checks. No known workarounds are available."},{"lang":"es","value":"nimiq/core-rs-albatross es una implementación en Rust del protocolo Nimiq Proof-of-Stake basado en el algoritmo de consenso Albatross. Antes de la versión 1.2.2, un validador malicioso o comprometido que es elegido como proponente puede publicar una propuesta de macrobloque donde `header.body_root` no coincide con el hash real del cuerpo del macrobloque. La propuesta puede pasar la verificación de la propuesta porque la ruta de verificación de la macropropuesta valida el encabezado pero no valida la vinculación `body_root == hash(body)`; el código posterior espera esta vinculación y puede entrar en pánico en caso de falta de coincidencia, provocando la caída de los validadores. Tenga en cuenta que el impacto es solo para los nodos validadores. El parche para esta vulnerabilidad se lanza formalmente como parte de la v1.2.2. El parche añade la verificación correspondiente del body root en las comprobaciones de la propuesta. No se conocen soluciones alternativas disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-354"}]}],"references":[{"url":"https://github.com/nimiq/core-rs-albatross/commit/6454c26d966858c5520f55739a30b94c17656c85","source":"security-advisories@github.com"},{"url":"https://github.com/nimiq/core-rs-albatross/pull/3623","source":"security-advisories@github.com"},{"url":"https://github.com/nimiq/core-rs-albatross/releases/tag/v1.2.2","source":"security-advisories@github.com"},{"url":"https://github.com/nimiq/core-rs-albatross/security/advisories/GHSA-7wh6-rmxx-ww47","source":"security-advisories@github.com"}]}}]}