{"api_version":"1","generated_at":"2026-04-08T12:43:59+00:00","cve":"CVE-2022-35916","urls":{"html":"https://cve.report/CVE-2022-35916","api":"https://cve.report/api/cve/CVE-2022-35916.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-35916","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-35916"},"summary":{"title":"CVE-2022-35916","description":"OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-08-01 21:15:00","updated_at":"2022-12-06 19:51:00"},"problem_types":["CWE-669"],"metrics":[],"references":[{"url":"https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr","name":"https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr","refsource":"CONFIRM","tags":[],"title":"Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls · Advisory · OpenZeppelin/openzeppelin-contracts · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578","name":"https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578","refsource":"MISC","tags":[],"title":"Fix arbitrum L1 to L2 crosschain call detection by Amxx · Pull Request #3578 · OpenZeppelin/openzeppelin-contracts · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-35916","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35916","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"35916","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openzeppelin","cpe5":"contracts","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"35916","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openzeppelin","cpe5":"contracts-upgradeable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"35916","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openzeppelin","cpe5":"contracts_upgradeable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"node.js","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-35916","STATE":"PUBLIC","TITLE":"Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"openzeppelin-contracts","version":{"version_data":[{"version_value":">= 4.6.0, < 4.7.2"}]}}]},"vendor_name":"OpenZeppelin"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-669: Incorrect Resource Transfer Between Spheres"}]}]},"references":{"reference_data":[{"name":"https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr","refsource":"CONFIRM","url":"https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr"},{"name":"https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578","refsource":"MISC","url":"https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578"}]},"source":{"advisory":"GHSA-9j3m-g383-29qr","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-08-01 21:15:00","lastModifiedDate":"2022-12-06 19:51:00","problem_types":["CWE-669"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.6.0","versionEndExcluding":"4.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openzeppelin:contracts_upgradeable:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.6.0","versionEndExcluding":"4.7.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}