Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

GHSA-c32p-wcqj-j677

CometBFT has inconsistencies between how commit signatures are verified and how block time is derived
Back to all
CVE

GHSA-c32p-wcqj-j677

CometBFT has inconsistencies between how commit signatures are verified and how block time is derived

CSA-2026-001: Tachyon

Description

Name: CSA-2026-001: Tachyon

Criticality: Critical (Catastrophic Impact; Possible Likelihood per ACMv1.2)

Affected versions: All versions of CometBFT

Affected users: Validators and protocols relying on block timestamps

Description

A consensus-level vulnerability was discovered in CometBFT's "BFT Time" implementation due to an inconsistency between how commit signatures are verified and how block time is derived.

This breaks a core BFT Time guarantee: "A faulty process cannot arbitrarily increase the Time value."

Impact

Downstream impact on chains affects any module, smart contract, or system that relies on the block timestamp.

Patches

The new CometBFT releases v0.38.21 and v0.37.18 fix this issue. The main unreleased branch is also patched.

Workarounds

There are no effective workarounds for this vulnerability. Upgrading to patched versions is required.

Timeline

  • January 8, 2026, 5:27PM UTC: Issue reported to Cosmos Bug Bounty Program
  • January 9, 2026, 4:55AM UTC: Issue triaged and validated by core team
  • January 12, 2026, 10:25PM UTC: Core team completes patch for the issue
  • January 13, 2026 4:41PM UTC: Pre-notification delivered to ecosystem partners
  • January 23, 2026, 3:00PM UTC: Patch made available

Credits

This issue was reported to the Cosmos Bug Bounty Program on HackerOne. Credit to SEAL 911 and QED Audit for the discovery and help with the patch.

If you believe you have found a bug in the Cosmos Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.

If you have questions about Cosmos security efforts, please reach out to our official communication channel at security@cosmoslabs.io.

A Github Security Advisory for this issue is available in the CometBFT repository. For more information about CometBFT, see https://docs.cometbft.com/.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Related Resources

No items found.

References

https://github.com/cometbft/cometbft/security/advisories/GHSA-c32p-wcqj-j677, https://github.com/cometbft/cometbft/commit/bf8274fcdbcab2bc652660ae627196a90a6efb97, https://github.com/cometbft/cometbft, https://github.com/cometbft/cometbft/releases/tag/v0.37.18, https://github.com/cometbft/cometbft/releases/tag/v0.38.21, https://pkg.go.dev/vuln/GO-2026-4361

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0.38.0-alpha.1,v0.34.27-alpha.1,v0.38.0-alpha.1,v0.39.0-beta.0,v0.0.0-20230123133650-38a4caeac055,v1.0.0-rc1,v1.0.0-alpha.2,v0.0.0-20240311092141-387f5653f532,v1.0.0-alpha.1,v0.0.0-20231115144641-10fa8d1016d9,v2.0.0-alpha.1,v2.0.0-20250604002332-f4d33abd2469,v0.0.0-20220921073404-2d1ada4d52df,v0.24.0-rc0,v0.0.0-20180831233351-7b88172f41fa
Fix Available
0.38.21,v0.37.18,v0.38.21,v0.0.0-20260123150127-c56d64ec53bd

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading